| /external/openssl/ssl/ |
| ssl_ciph.c | 113 * ECC cipher suite support in OpenSSL originally developed by 214 const SSL_CIPHER *cipher; member in struct:cipher_order_st 467 c=s->cipher; 732 co_list[co_list_num].cipher = c; 796 *ca_curr = ciph_curr->cipher; 805 * or represent a cipher strength value (will be added in any case because algorithms=0). 883 cp = curr->cipher; 920 /* add the cipher if it has not been added yet. */ 930 /* Move the added cipher to this location */ 990 (curr->cipher->strength_bits > max_strength_bits) [all...] |
| ssltest.c | 113 * ECC cipher suite support in OpenSSL originally developed by 252 static char *cipher=NULL; variable 307 fprintf(stderr," -cipher arg - The cipher list\n"); 318 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n"); 330 BIO_printf(bio_stdout,"%s%s, cipher %s %s", 500 cipher = 0; 633 else if (strcmp(*argv,"-cipher") == 0) 636 cipher= *(++argv); 720 /* ensure that the cipher list are correctly sorted and exit * [all...] |
| ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 315 * to the default cipher setup will also be included here. 324 /* The following cipher list is used by default. 325 * It also is substituted when an application-defined cipher list string 383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); 409 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 425 * Cipher OCTET STRING, -- the 3 byte cipher ID 490 const SSL_CIPHER *cipher; member in struct:ssl_session_st 493 * the 'cipher' structure * [all...] |
| /external/ppp/pppd/ |
| eap.c | 651 u_char clear[8], cipher[8], dig[SHA_DIGESTSIZE], *optr, *cp; local 780 if (!DesEncrypt(clear, cipher)) { 786 outp += b64enc(&b64, cipher, 8, outp); 788 (void) DesEncrypt(cp, cipher); 789 outp += b64enc(&b64, cipher, 8, outp); 800 (void) DesEncrypt(clear, cipher); 801 outp += b64enc(&b64, cipher, 8, outp); [all...] |
| /external/wpa_supplicant/ |
| tlsv1_common.h | 175 tls_cipher cipher; member in struct:tls_cipher_suite 185 tls_cipher cipher; member in struct:tls_cipher_data
|
| wpa_supplicant.c | 259 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local 262 wpa_s->pairwise_cipher = cipher; 264 wpa_s->group_cipher = cipher; 347 wpa_printf(MSG_INFO, "WPA: Invalid group cipher %d for " [all...] |
| tlsv1_client.c | 344 "cipher suite 0x%04x", cipher_suite); 352 "cipher suite for a resumed connection (0x%04x != " 756 "with the selected cipher suite"); 940 wpa_printf(MSG_DEBUG, "TLSv1: Failed to change read cipher " 2188 char *cipher; local [all...] |
| wpa.c | 153 * Management Group Cipher Suite (4 octets) (default: AES-128-CMAC) 229 * wpa_cipher_txt - Convert cipher suite to a text string 230 * @cipher: Cipher suite (WPA_CIPHER_* enum) 231 * Returns: Pointer to a text string of the cipher suite name 233 static const char * wpa_cipher_txt(int cipher) 235 switch (cipher) { 524 "cipher", __func__); 554 "pairwise cipher", __func__); 612 "group cipher 0x%x", __func__ 2257 int cipher; local 2552 int cipher; local [all...] |
| /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
| eap_fast.c | 1539 char cipher[80]; local [all...] |
| /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
| eap_fast.c | 444 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher " 551 char cipher[64]; local 555 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 557 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher " 562 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL; [all...] |
| /external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
| tlsv1_common.h | 178 tls_cipher cipher; member in struct:tls_cipher_suite 188 tls_cipher cipher; member in struct:tls_cipher_data 208 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher); 209 int tls_server_key_exchange_allowed(tls_cipher cipher);
|
| /external/chromium/net/third_party/nss/ssl/ |
| sslcon.c | 96 PRUint8 keyLen; /* cipher symkey size in bytes. */ 153 * lsb corresponds to first cipher suite in allCipherSuites[]. 176 /* Construct a socket's list of cipher specs from the global default values. 208 /* ask SSL3 how many cipher suites it has. */ 214 /* Allocate memory to hold cipher specs */ 228 /* fill in cipher specs for SSL2 cipher suites */ 253 ** (e.g. SSL2 or SSL3) is logically enabled, but all its cipher suites 256 ** if no cipher suites are found, it sets the error code and returns 682 ssl2_SendSessionKeyMessage(sslSocket *ss, int cipher, int keySize 2053 int cipher; local 3239 int cipher; local [all...] |
| ssl3con.c | 102 /* This list of SSL3 cipher suites is sorted in descending order of 103 * precedence (desirability). It only includes cipher suites we implement. 104 * This table is modified by SSL3_SetPolicy(). The ordering of cipher suites 251 /* cipher calg keySz secretSz type ivSz BlkSz keygen */ 348 /* New TLS cipher suites */ 601 /* Find the cipher configuration struct associate with suite */ 651 /* We need the cipher defs to see if we have a token that can handle 652 * this cipher. It isn't part of the static definition. 676 * cipher suites. Correcting the computation for svrAuth, 678 * negotiate cipher suites they do not implement. So, unti 1217 SSL3BulkCipher cipher; local [all...] |
| sslimpl.h | 297 ** SSL3 cipher suite policy and preference struct. 473 /* The SSL bulk cipher definition */ 490 cipher_missing /* reserved for no such supported cipher */ 601 /* Stuff used to recreate key and read/write cipher objects */ 689 SSL3BulkCipher cipher; member in struct:ssl3BulkCipherDefStr 809 /* This says what cipher suites we can do, and should [all...] |
| /external/openssl/apps/ |
| s_server.c | 113 * ECC cipher suite support in OpenSSL originally developed by 264 static char *cipher=NULL; variable 376 cipher=NULL; 448 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n"); 449 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n"); 1020 else if (strcmp(*argv,"-cipher") == 0) 1023 cipher= *(++argv); [all...] |
| /external/openssl/crypto/pem/ |
| pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon5426 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
| /external/openssl/crypto/pkcs7/ |
| pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
| /external/openssl/include/openssl/ |
| pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon5470 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
| pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
| x509.h | 504 EVP_CIPHER_INFO cipher; member in struct:private_key_st [all...] |
| evp.h | 319 /* Values for cipher flags */ 329 /* Set if variable length cipher */ 331 /* Set if the iv handling should be done by the cipher itself */ 333 /* Set if the cipher's init() function should be called if key is NULL */ 335 /* Call ctrl() to init cipher parameters */ 341 /* cipher handles random key generation */ 343 /* cipher has its own additional copying logic */ 364 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 370 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st 371 ENGINE *engine; /* functional reference if 'cipher' is ENGINE-provided * [all...] |
| ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 315 * to the default cipher setup will also be included here. 324 /* The following cipher list is used by default. 325 * It also is substituted when an application-defined cipher list string 383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); 409 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 425 * Cipher OCTET STRING, -- the 3 byte cipher ID 490 const SSL_CIPHER *cipher; member in struct:ssl_session_st 493 * the 'cipher' structure * [all...] |
| /libcore/luni/src/main/native/ |
| NativeCrypto.cpp | 2231 const SSL_CIPHER* cipher = ssl_method->get_cipher(j); local 3287 const SSL_CIPHER* cipher = ssl_session->cipher; local [all...] |
| /external/openssl/crypto/x509/ |
| x509.h | 504 EVP_CIPHER_INFO cipher; member in struct:private_key_st [all...] |
| /external/openssl/crypto/evp/ |
| evp.h | 319 /* Values for cipher flags */ 329 /* Set if variable length cipher */ 331 /* Set if the iv handling should be done by the cipher itself */ 333 /* Set if the cipher's init() function should be called if key is NULL */ 335 /* Call ctrl() to init cipher parameters */ 341 /* cipher handles random key generation */ 343 /* cipher has its own additional copying logic */ 364 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 370 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st 371 ENGINE *engine; /* functional reference if 'cipher' is ENGINE-provided * [all...] |