| /external/openssl/crypto/pem/ |
| pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon32104 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
| /external/openssl/crypto/pkcs7/ |
| pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
| /external/openssl/include/openssl/ |
| cms.h | 161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, 178 const EVP_CIPHER *cipher, unsigned int flags); variable 193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
|
| pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon32147 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
| pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
| x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st [all...] |
| evp.h | 322 /* Values for cipher flags */ 336 /* Set if variable length cipher */ 338 /* Set if the iv handling should be done by the cipher itself */ 340 /* Set if the cipher's init() function should be called if key is NULL */ 342 /* Call ctrl() to init cipher parameters */ 348 /* cipher handles random key generation */ 350 /* cipher has its own additional copying logic */ 358 /* Allow non FIPS cipher in FIPS mode */ 360 /* Cipher handles any and all padding logic as well 387 /* AEAD cipher deduces payload length and returns number of byte 407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
| /external/openssl/ssl/ |
| ssltest.c | 113 * ECC cipher suite support in OpenSSL originally developed by 298 static char *cipher=NULL; variable 360 fprintf(stderr," -cipher arg - The cipher list\n"); 371 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n"); 381 BIO_printf(bio_stdout,"%s%s, cipher %s %s", 557 cipher = 0; 713 else if (strcmp(*argv,"-cipher") == 0) 716 cipher= *(++argv); 792 /* ensure that the cipher list are correctly sorted and exit * [all...] |
| /external/wpa_supplicant_8/src/rsn_supp/ |
| tdls.c | 106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer 193 switch (peer->cipher) { 199 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: " 203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", 682 peer->cipher = 0; 1054 * RSN IE is filled only with CCMP CIPHER 1057 * Regardless of the cipher used on the AP connection, select CCMP 1657 int cipher; local 2029 int cipher; local [all...] |
| /external/wpa_supplicant_8/src/tls/ |
| tlsv1_common.h | 216 tls_cipher cipher; member in struct:tls_cipher_suite 226 tls_cipher cipher; member in struct:tls_cipher_data 249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher); 250 int tls_server_key_exchange_allowed(tls_cipher cipher);
|
| /external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
| x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st [all...] |
| /external/chromium_org/third_party/openssl/openssl/include/openssl/ |
| x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st [all...] |
| evp.h | 322 /* Values for cipher flags */ 336 /* Set if variable length cipher */ 338 /* Set if the iv handling should be done by the cipher itself */ 340 /* Set if the cipher's init() function should be called if key is NULL */ 342 /* Call ctrl() to init cipher parameters */ 348 /* cipher handles random key generation */ 350 /* cipher has its own additional copying logic */ 358 /* Allow non FIPS cipher in FIPS mode */ 360 /* Cipher handles any and all padding logic as well 387 /* AEAD cipher deduces payload length and returns number of byte 407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
| /external/openssl/crypto/x509/ |
| x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st [all...] |
| /external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
| evp.h | 322 /* Values for cipher flags */ 336 /* Set if variable length cipher */ 338 /* Set if the iv handling should be done by the cipher itself */ 340 /* Set if the cipher's init() function should be called if key is NULL */ 342 /* Call ctrl() to init cipher parameters */ 348 /* cipher handles random key generation */ 350 /* cipher has its own additional copying logic */ 358 /* Allow non FIPS cipher in FIPS mode */ 360 /* Cipher handles any and all padding logic as well 387 /* AEAD cipher deduces payload length and returns number of byte 407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
| /external/openssl/crypto/evp/ |
| evp.h | 322 /* Values for cipher flags */ 336 /* Set if variable length cipher */ 338 /* Set if the iv handling should be done by the cipher itself */ 340 /* Set if the cipher's init() function should be called if key is NULL */ 342 /* Call ctrl() to init cipher parameters */ 348 /* cipher handles random key generation */ 350 /* cipher has its own additional copying logic */ 358 /* Allow non FIPS cipher in FIPS mode */ 360 /* Cipher handles any and all padding logic as well 387 /* AEAD cipher deduces payload length and returns number of byte 407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
| /external/chromium_org/net/third_party/nss/ssl/ |
| ssl3con.c | 110 /* This list of SSL3 cipher suites is sorted in descending order of 111 * precedence (desirability). It only includes cipher suites we implement. 112 * This table is modified by SSL3_SetPolicy(). The ordering of cipher suites 115 * Important: See bug 946147 before enabling, reordering, or adding any cipher 181 /* 56-bit DES "domestic" cipher suites */ 215 * because it SSL_ImplementedCiphers includes SSL 2.0 cipher suites. 290 /* cipher calg k s type i b t n */ 394 /* New TLS cipher suites */ 656 /* See RFC 4346 A.5. Export cipher suites must not be used in TLS 1.1 or 657 * later. This set of cipher suites is similar to, but different from, th 1405 SSL3BulkCipher cipher; local [all...] |
| sslimpl.h | 286 ** SSL3 cipher suite policy and preference struct. 471 /* The SSL bulk cipher definition */ 490 cipher_missing /* reserved for no such supported cipher */ 561 * the cipher spec. Note that this is a ring buffer but left and 660 /* Stuff used to recreate key and read/write cipher objects */ 773 SSL3BulkCipher cipher; member in struct:ssl3BulkCipherDefStr [all...] |
| /prebuilts/eclipse/maven/apache-maven-3.2.1/lib/ |
| maven-embedder-3.2.1.jar | |
| /external/google-tv-pairing-protocol/java/jar/ |
| bcprov-jdk15-143.jar | |
| /prebuilts/devtools/tools/lib/ |
| bcprov-jdk15on-1.48.jar | |
| /prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/ |
| bcprov-jdk15on-1.48.jar | |
| /external/conscrypt/src/main/native/ |
| org_conscrypt_NativeCrypto.cpp | 7711 SSL_CIPHER* cipher = to_SSL_CIPHER(env, ssl_cipher_address, true); local 7719 SSL_CIPHER* cipher = to_SSL_CIPHER(env, ssl_cipher_address, true); local 7761 const SSL_CIPHER* cipher = ssl_method->get_cipher(j); local 9444 const SSL_CIPHER* cipher = ssl_session->cipher; local [all...] |
| /external/wpa_supplicant_8/src/drivers/ |
| driver_nl80211.c | 8756 u32 cipher = wpa_cipher_to_cipher_suite(params->pairwise_suite); local 8769 u32 cipher = wpa_cipher_to_cipher_suite(params->group_suite); local [all...] |
| /prebuilts/sdk/tools/lib/ |
| signapk.jar | |