/external/openssl/crypto/engine/ |
tb_cipher.c | 76 if(e->ciphers) 79 int num_nids = e->ciphers(e, NULL, &nids, 0); 98 if(e->ciphers) 101 int num_nids = e->ciphers(e, NULL, &nids, 0); 135 return e->ciphers; 141 e->ciphers = f;
|
eng_cryptodev.c | 145 } ciphers[] = { variable in typeref:struct:__anon5553 226 * Find out what ciphers /dev/crypto will let us have a session for. 245 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) { 246 if (ciphers[i].nid == NID_undef) 248 sess.cipher = ciphers[i].id; 249 sess.keylen = ciphers[i].keylen; 253 nids[count++] = ciphers[i].nid; 305 * Find the useable ciphers|digests from dev/crypto - this is the first 307 * can use for ciphers from this engine. We want to return 416 for (i = 0; ciphers[i].id; i++ [all...] |
eng_int.h | 167 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
|
eng_list.c | 337 dest->ciphers = src->ciphers;
|
eng_lib.c | 93 e->ciphers = NULL;
|
/external/dropbear/libtomcrypt/ |
Android.mk | 9 src/ciphers/aes/aes.c src/ciphers/anubis.c src/ciphers/blowfish.c \ 10 src/ciphers/cast5.c src/ciphers/des.c src/ciphers/kasumi.c src/ciphers/khazad.c src/ciphers/kseed.c \ 11 src/ciphers/noekeon.c src/ciphers/rc2.c src/ciphers/rc5.c src/ciphers/rc6.c src/ciphers/safer/safer.c [all...] |
/external/openssl/apps/ |
ciphers.c | 1 /* apps/ciphers.c */ 73 "usage: ciphers args\n", 74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n", 93 char *ciphers=NULL; local 149 ciphers= *argv; 166 if (ciphers != NULL) { 167 if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
|
Android.mk | 11 ciphers.c \
|
progs.pl | 34 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
|
/external/openssl/patches/ |
apps_Android.mk | 11 ciphers.c \
|
/external/wpa_supplicant/ |
tlsv1_client.h | 46 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
|
tls_none.c | 158 u8 *ciphers)
|
tls_internal.c | 243 u8 *ciphers) 245 return tlsv1_client_set_cipher_list(conn->client, ciphers);
|
tls.h | 390 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 395 u8 *ciphers);
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client.h | 47 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
|
tlsv1_server.h | 43 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
|
tlsv1_client.c | 602 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 606 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) 613 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
tlsv1_server.c | 543 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 547 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) 554 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/external/openssl/ssl/ |
s3_srvr.c | 797 STACK_OF(SSL_CIPHER) *ciphers=NULL; 971 if ((i > 0) && (ssl_bytes_to_cipher_list(s,p,i,&(ciphers)) 985 printf("client sent %d ciphers\n",sk_num(ciphers)); 987 for (i=0; i<sk_SSL_CIPHER_num(ciphers); i++) 989 c=sk_SSL_CIPHER_value(ciphers,i); 992 i,sk_num(ciphers),SSL_CIPHER_get_name(c)); 1000 if (j == 0 && (s->options & SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG) && (sk_SSL_CIPHER_num(ciphers) == 1)) 1007 c = sk_SSL_CIPHER_value(ciphers, 0); 1087 ciphers, &pref_cipher, s->tls_session_secret_cb_arg) [all...] |
s23_clnt.c | 256 STACK_OF(SSL_CIPHER) *ciphers; 258 ciphers = SSL_get_ciphers(s); 259 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) 261 cipher = sk_SSL_CIPHER_value(ciphers, i); 367 /* Ciphers supported */ 371 /* no ciphers */ 433 /* Ciphers supported (using SSL 3.0/TLS 1.0 format) */
|
s2_srvr.c | 640 &s->session->ciphers); 666 sk_SSL_CIPHER_free(s->session->ciphers); 667 s->session->ciphers = prio; 669 /* s->session->ciphers should now have a list of 670 * ciphers that are on both the client and server. 672 * the ciphers or in the order of the server's preference 766 s2n(0,p); /* ciphers len */ 779 /* lets send out the ciphers we like in the 781 sk= s->session->ciphers; 782 n=ssl_cipher_list_to_bytes(s,s->session->ciphers,d,0) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_internal.c | 435 u8 *ciphers) 439 return tlsv1_client_set_cipher_list(conn->client, ciphers); 443 return tlsv1_server_set_cipher_list(conn->server, ciphers);
|
tls_none.c | 151 u8 *ciphers)
|
tls.h | 398 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 404 u8 *ciphers);
|
/external/chromium/net/third_party/nss/ssl/ |
ssl.h | 67 /* Macro to tell which ciphers in table are SSL2 vs SSL3/TLS. */ 151 ** Control ciphers that SSL uses. If on is non-zero then the named cipher 471 * This essentially enables all supported ciphers. 481 * to explicitly allow those ciphers you may legally export. 514 ** If MS can be extracted for all ciphers, (*pcanbypass) is set to TRUE and 536 PRUint16 *ciphers, int nciphers,
|