HomeSort by relevance Sort by last modified time
    Searched defs:cipher (Results 101 - 125 of 176) sorted by null

1 2 3 45 6 7 8

  /external/chromium_org/net/third_party/nss/ssl/
ssl3ext.c 2082 PRUint16 cipher = 0; local
    [all...]
sslcon.c 61 PRUint8 keyLen; /* cipher symkey size in bytes. */
118 * lsb corresponds to first cipher suite in allCipherSuites[].
141 /* Construct a socket's list of cipher specs from the global default values.
173 /* ask SSL3 how many cipher suites it has. */
179 /* Allocate memory to hold cipher specs */
193 /* fill in cipher specs for SSL2 cipher suites */
218 ** (e.g. SSL2 or SSL3) is logically enabled, but all its cipher suites
221 ** if no cipher suites are found, it sets the error code and returns
649 ssl2_SendSessionKeyMessage(sslSocket *ss, int cipher, int keySize
2021 int cipher; local
3223 int cipher; local
    [all...]
sslsock.c 1135 /* function tells us if the cipher suite is one that we no longer support. */
1337 const PRUint16 *cipher; local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/apps/
req.c 181 const EVP_CIPHER *cipher=NULL; local
199 cipher=EVP_des_ede3_cbc();
747 cipher=NULL;
748 if (nodes) cipher=NULL;
752 if (!PEM_write_bio_PrivateKey(out,pkey,cipher,
    [all...]
s_client.c 342 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n");
343 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n");
580 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local
904 else if (strcmp(*argv,"-cipher") == 0)
907 cipher= *(++argv);
1006 if (cipher)
1008 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
1011 cipher = "PSK";
    [all...]
s_server.c 113 * ECC cipher suite support in OpenSSL originally developed by
267 static char *cipher=NULL; variable
429 cipher=NULL;
501 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n");
502 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n");
    [all...]
  /external/chromium_org/third_party/openssl/openssl/ssl/
ssl_ciph.c 113 * ECC cipher suite support in OpenSSL originally developed by
220 const SSL_CIPHER *cipher; member in struct:cipher_order_st
514 * for |s->cipher|. It returns 1 on success and 0 on error. */
517 const SSL_CIPHER *c = s->cipher;
547 c=s->cipher;
851 co_list[co_list_num].cipher = c;
915 *ca_curr = ciph_curr->cipher;
924 * or represent a cipher strength value (will be added in any case because algorithms=0).
1002 cp = curr->cipher;
    [all...]
t1_enc.c 381 /* tls1_change_cipher_state_cipher performs the work needed to switch cipher
393 const EVP_CIPHER *cipher = s->s3->tmp.new_sym_enc; local
502 is_aead_cipher = (EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) != 0;
515 if (EVP_CIPHER_mode(cipher) == EVP_CIPH_GCM_MODE)
517 EVP_CipherInit_ex(cipher_ctx, cipher, NULL /* engine */, key,
522 EVP_CipherInit_ex(cipher_ctx, cipher, NULL /* engine */, key, iv, !is_read);
558 const EVP_CIPHER *cipher = s->s3->tmp.new_sym_enc; local
624 key_len = EVP_CIPHER_key_length(cipher);
628 if (EVP_CIPHER_mode(cipher) == EVP_CIPH_GCM_MODE)
631 iv_len = EVP_CIPHER_iv_length(cipher);
    [all...]
ssltest.c 113 * ECC cipher suite support in OpenSSL originally developed by
298 static char *cipher=NULL; variable
360 fprintf(stderr," -cipher arg - The cipher list\n");
371 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n");
381 BIO_printf(bio_stdout,"%s%s, cipher %s %s",
557 cipher = 0;
713 else if (strcmp(*argv,"-cipher") == 0)
716 cipher= *(++argv);
792 /* ensure that the cipher list are correctly sorted and exit *
    [all...]
  /external/openssl/apps/
req.c 181 const EVP_CIPHER *cipher=NULL; local
199 cipher=EVP_des_ede3_cbc();
746 cipher=NULL;
747 if (nodes) cipher=NULL;
751 if (!PEM_write_bio_PrivateKey(out,pkey,cipher,
    [all...]
s_client.c 342 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n");
343 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n");
582 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local
915 else if (strcmp(*argv,"-cipher") == 0)
918 cipher= *(++argv);
1017 if (cipher)
1019 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
1022 cipher = "PSK";
    [all...]
s_server.c 113 * ECC cipher suite support in OpenSSL originally developed by
267 static char *cipher=NULL; variable
429 cipher=NULL;
501 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n");
502 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n");
    [all...]
  /external/openssl/crypto/cms/
cms_lcl.h 175 const EVP_CIPHER *cipher; member in struct:CMS_EncryptedContentInfo_st
456 const EVP_CIPHER *cipher,
cms.h 161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher,
178 const EVP_CIPHER *cipher, unsigned int flags); variable
193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
  /external/openssl/ssl/
ssl_ciph.c 113 * ECC cipher suite support in OpenSSL originally developed by
220 const SSL_CIPHER *cipher; member in struct:cipher_order_st
493 c=s->cipher;
810 co_list[co_list_num].cipher = c;
874 *ca_curr = ciph_curr->cipher;
883 * or represent a cipher strength value (will be added in any case because algorithms=0).
961 cp = curr->cipher;
998 /* add the cipher if it has not been added yet. */
1008 /* Move the added cipher to this location */
    [all...]
  /external/pdfium/core/src/fpdfapi/fpdf_parser/
fpdf_parser_encrypt.cpp 106 static FX_BOOL _LoadCryptInfo(CPDF_Dictionary* pEncryptDict, FX_BSTR name, int& cipher, int& keylen)
110 cipher = FXCIPHER_RC4;
118 cipher = FXCIPHER_NONE;
139 cipher = FXCIPHER_AES;
170 FX_BOOL CPDF_StandardSecurityHandler::LoadDict(CPDF_Dictionary* pEncryptDict, FX_DWORD type, int& cipher, int& key_len)
185 if (!_LoadCryptInfo(pEncryptDict, strf_name, cipher, key_len)) {
188 m_Cipher = cipher;
193 FX_BOOL CPDF_StandardSecurityHandler::GetCryptInfo(int& cipher, FX_LPCBYTE& buffer, int& keylen)
195 cipher = m_Cipher;
502 int cipher = 0, key_len = 0; local
    [all...]
  /external/ppp/pppd/
eap.c 651 u_char clear[8], cipher[8], dig[SHA_DIGESTSIZE], *optr, *cp; local
780 if (!DesEncrypt(clear, cipher)) {
786 outp += b64enc(&b64, cipher, 8, outp);
788 (void) DesEncrypt(cp, cipher);
789 outp += b64enc(&b64, cipher, 8, outp);
800 (void) DesEncrypt(clear, cipher);
801 outp += b64enc(&b64, cipher, 8, outp);
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_openssl.c 363 const EVP_CIPHER *cipher; local
372 cipher = EVP_rc4();
379 cipher = EVP_aes_128_cbc();
382 cipher = EVP_aes_192_cbc();
385 cipher = EVP_aes_256_cbc();
395 cipher = EVP_des_ede3_cbc();
398 cipher = EVP_des_cbc();
403 cipher = EVP_rc2_ecb();
413 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) ||
423 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NULL, NULL, NULL) |
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_atheros.c 287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
293 printf("Unable to set group key cipher to %u\n", v);
474 u_int8_t cipher; local
485 cipher = IEEE80211_CIPHER_WEP;
488 cipher = IEEE80211_CIPHER_TKIP;
491 cipher = IEEE80211_CIPHER_AES_CCM;
495 cipher = IEEE80211_CIPHER_AES_CCM_256;
498 cipher = IEEE80211_CIPHER_AES_GCM;
501 cipher = IEEE80211_CIPHER_AES_GCM_256
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_fast.c 1572 char cipher[80]; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_fast.c 440 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher "
547 char cipher[64]; local
551 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher))
553 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher "
558 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/pem/
pem.h 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon18503
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/
pkcs7.h 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
pem.h 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon18549
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
pkcs7.h 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable

Completed in 1380 milliseconds

1 2 3 45 6 7 8