| /external/chromium_org/net/third_party/nss/ssl/ |
| ssl3ext.c | 2082 PRUint16 cipher = 0; local [all...] |
| sslcon.c | 61 PRUint8 keyLen; /* cipher symkey size in bytes. */ 118 * lsb corresponds to first cipher suite in allCipherSuites[]. 141 /* Construct a socket's list of cipher specs from the global default values. 173 /* ask SSL3 how many cipher suites it has. */ 179 /* Allocate memory to hold cipher specs */ 193 /* fill in cipher specs for SSL2 cipher suites */ 218 ** (e.g. SSL2 or SSL3) is logically enabled, but all its cipher suites 221 ** if no cipher suites are found, it sets the error code and returns 649 ssl2_SendSessionKeyMessage(sslSocket *ss, int cipher, int keySize 2021 int cipher; local 3223 int cipher; local [all...] |
| sslsock.c | 1135 /* function tells us if the cipher suite is one that we no longer support. */ 1337 const PRUint16 *cipher; local [all...] |
| /external/chromium_org/third_party/openssl/openssl/apps/ |
| req.c | 181 const EVP_CIPHER *cipher=NULL; local 199 cipher=EVP_des_ede3_cbc(); 747 cipher=NULL; 748 if (nodes) cipher=NULL; 752 if (!PEM_write_bio_PrivateKey(out,pkey,cipher, [all...] |
| s_client.c | 342 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n"); 343 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n"); 580 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local 904 else if (strcmp(*argv,"-cipher") == 0) 907 cipher= *(++argv); 1006 if (cipher) 1008 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n"); 1011 cipher = "PSK"; [all...] |
| s_server.c | 113 * ECC cipher suite support in OpenSSL originally developed by 267 static char *cipher=NULL; variable 429 cipher=NULL; 501 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n"); 502 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n"); [all...] |
| /external/chromium_org/third_party/openssl/openssl/ssl/ |
| ssl_ciph.c | 113 * ECC cipher suite support in OpenSSL originally developed by 220 const SSL_CIPHER *cipher; member in struct:cipher_order_st 514 * for |s->cipher|. It returns 1 on success and 0 on error. */ 517 const SSL_CIPHER *c = s->cipher; 547 c=s->cipher; 851 co_list[co_list_num].cipher = c; 915 *ca_curr = ciph_curr->cipher; 924 * or represent a cipher strength value (will be added in any case because algorithms=0). 1002 cp = curr->cipher; [all...] |
| t1_enc.c | 381 /* tls1_change_cipher_state_cipher performs the work needed to switch cipher 393 const EVP_CIPHER *cipher = s->s3->tmp.new_sym_enc; local 502 is_aead_cipher = (EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) != 0; 515 if (EVP_CIPHER_mode(cipher) == EVP_CIPH_GCM_MODE) 517 EVP_CipherInit_ex(cipher_ctx, cipher, NULL /* engine */, key, 522 EVP_CipherInit_ex(cipher_ctx, cipher, NULL /* engine */, key, iv, !is_read); 558 const EVP_CIPHER *cipher = s->s3->tmp.new_sym_enc; local 624 key_len = EVP_CIPHER_key_length(cipher); 628 if (EVP_CIPHER_mode(cipher) == EVP_CIPH_GCM_MODE) 631 iv_len = EVP_CIPHER_iv_length(cipher); [all...] |
| ssltest.c | 113 * ECC cipher suite support in OpenSSL originally developed by 298 static char *cipher=NULL; variable 360 fprintf(stderr," -cipher arg - The cipher list\n"); 371 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n"); 381 BIO_printf(bio_stdout,"%s%s, cipher %s %s", 557 cipher = 0; 713 else if (strcmp(*argv,"-cipher") == 0) 716 cipher= *(++argv); 792 /* ensure that the cipher list are correctly sorted and exit * [all...] |
| /external/openssl/apps/ |
| req.c | 181 const EVP_CIPHER *cipher=NULL; local 199 cipher=EVP_des_ede3_cbc(); 746 cipher=NULL; 747 if (nodes) cipher=NULL; 751 if (!PEM_write_bio_PrivateKey(out,pkey,cipher, [all...] |
| s_client.c | 342 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n"); 343 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n"); 582 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local 915 else if (strcmp(*argv,"-cipher") == 0) 918 cipher= *(++argv); 1017 if (cipher) 1019 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n"); 1022 cipher = "PSK"; [all...] |
| s_server.c | 113 * ECC cipher suite support in OpenSSL originally developed by 267 static char *cipher=NULL; variable 429 cipher=NULL; 501 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n"); 502 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n"); [all...] |
| /external/openssl/crypto/cms/ |
| cms_lcl.h | 175 const EVP_CIPHER *cipher; member in struct:CMS_EncryptedContentInfo_st 456 const EVP_CIPHER *cipher,
|
| cms.h | 161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, 178 const EVP_CIPHER *cipher, unsigned int flags); variable 193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
|
| /external/openssl/ssl/ |
| ssl_ciph.c | 113 * ECC cipher suite support in OpenSSL originally developed by 220 const SSL_CIPHER *cipher; member in struct:cipher_order_st 493 c=s->cipher; 810 co_list[co_list_num].cipher = c; 874 *ca_curr = ciph_curr->cipher; 883 * or represent a cipher strength value (will be added in any case because algorithms=0). 961 cp = curr->cipher; 998 /* add the cipher if it has not been added yet. */ 1008 /* Move the added cipher to this location */ [all...] |
| /external/pdfium/core/src/fpdfapi/fpdf_parser/ |
| fpdf_parser_encrypt.cpp | 106 static FX_BOOL _LoadCryptInfo(CPDF_Dictionary* pEncryptDict, FX_BSTR name, int& cipher, int& keylen)
110 cipher = FXCIPHER_RC4;
118 cipher = FXCIPHER_NONE;
139 cipher = FXCIPHER_AES;
170 FX_BOOL CPDF_StandardSecurityHandler::LoadDict(CPDF_Dictionary* pEncryptDict, FX_DWORD type, int& cipher, int& key_len)
185 if (!_LoadCryptInfo(pEncryptDict, strf_name, cipher, key_len)) {
188 m_Cipher = cipher;
193 FX_BOOL CPDF_StandardSecurityHandler::GetCryptInfo(int& cipher, FX_LPCBYTE& buffer, int& keylen)
195 cipher = m_Cipher;
502 int cipher = 0, key_len = 0; local [all...] |
| /external/ppp/pppd/ |
| eap.c | 651 u_char clear[8], cipher[8], dig[SHA_DIGESTSIZE], *optr, *cp; local 780 if (!DesEncrypt(clear, cipher)) { 786 outp += b64enc(&b64, cipher, 8, outp); 788 (void) DesEncrypt(cp, cipher); 789 outp += b64enc(&b64, cipher, 8, outp); 800 (void) DesEncrypt(clear, cipher); 801 outp += b64enc(&b64, cipher, 8, outp); [all...] |
| /external/wpa_supplicant_8/src/crypto/ |
| crypto_openssl.c | 363 const EVP_CIPHER *cipher; local 372 cipher = EVP_rc4(); 379 cipher = EVP_aes_128_cbc(); 382 cipher = EVP_aes_192_cbc(); 385 cipher = EVP_aes_256_cbc(); 395 cipher = EVP_des_ede3_cbc(); 398 cipher = EVP_des_cbc(); 403 cipher = EVP_rc2_ecb(); 413 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) || 423 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NULL, NULL, NULL) | [all...] |
| /external/wpa_supplicant_8/src/drivers/ |
| driver_atheros.c | 287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 293 printf("Unable to set group key cipher to %u\n", v); 474 u_int8_t cipher; local 485 cipher = IEEE80211_CIPHER_WEP; 488 cipher = IEEE80211_CIPHER_TKIP; 491 cipher = IEEE80211_CIPHER_AES_CCM; 495 cipher = IEEE80211_CIPHER_AES_CCM_256; 498 cipher = IEEE80211_CIPHER_AES_GCM; 501 cipher = IEEE80211_CIPHER_AES_GCM_256 [all...] |
| /external/wpa_supplicant_8/src/eap_peer/ |
| eap_fast.c | 1572 char cipher[80]; local [all...] |
| /external/wpa_supplicant_8/src/eap_server/ |
| eap_server_fast.c | 440 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher " 547 char cipher[64]; local 551 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 553 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher " 558 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL; [all...] |
| /external/chromium_org/third_party/openssl/openssl/crypto/pem/ |
| pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon18503 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
| /external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
| pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
| /external/chromium_org/third_party/openssl/openssl/include/openssl/ |
| pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon18549 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
| pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|