/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_ssl.py | 180 with self.assertRaisesRegexp(ssl.SSLError, "No cipher can be selected"): 393 (remote, s.cipher())) 432 cipher = self.sslconn.cipher() 434 sys.stdout.write(" server: connection cipher is now " + str(cipher) + "\n") 768 self.request.cipher(), [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
ssl.py | 183 def cipher(self): member in class:SSLSocket 188 return self._sslobj.cipher()
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_ssl.py | 180 with self.assertRaisesRegexp(ssl.SSLError, "No cipher can be selected"): 393 (remote, s.cipher())) 432 cipher = self.sslconn.cipher() 434 sys.stdout.write(" server: connection cipher is now " + str(cipher) + "\n") 768 self.request.cipher(), [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
dtlstransportchannel.h | 165 // Find out which DTLS-SRTP cipher was negotiated 166 virtual bool GetSrtpCipher(std::string* cipher);
|
p2ptransportchannel.h | 128 // Find out which DTLS-SRTP cipher was negotiated 129 virtual bool GetSrtpCipher(std::string* cipher) {
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s2_clnt.c | 479 * (highest priority) cipher the server sends, otherwise 510 s->session->cipher=sk_SSL_CIPHER_value(prio,i); 549 /* CIPHER **cipher;*/ 581 s2n(n,p); /* cipher spec num bytes */ 637 i=ssl_put_cipher_by_char(s,sess->cipher,p); 671 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 673 else if (SSL_C_IS_EXPORT(sess->cipher))
|
s3_enc.c | 444 if (s->session->cipher != NULL) 446 if (s->session->cipher->algorithm_enc == SSL_eNULL) 450 if (s->session->cipher->algorithm_enc == SSL_RC4) 520 bs=EVP_CIPHER_block_size(ds->cipher);
|
kssl.c | [all...] |
ssltest.c | 113 * ECC cipher suite support in OpenSSL originally developed by 298 static char *cipher=NULL; variable 360 fprintf(stderr," -cipher arg - The cipher list\n"); 371 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n"); 381 BIO_printf(bio_stdout,"%s%s, cipher %s %s", 557 cipher = 0; 713 else if (strcmp(*argv,"-cipher") == 0) 716 cipher= *(++argv); 792 /* ensure that the cipher list are correctly sorted and exit * [all...] |
/external/openssl/ssl/ |
s2_clnt.c | 479 * (highest priority) cipher the server sends, otherwise 510 s->session->cipher=sk_SSL_CIPHER_value(prio,i); 549 /* CIPHER **cipher;*/ 581 s2n(n,p); /* cipher spec num bytes */ 637 i=ssl_put_cipher_by_char(s,sess->cipher,p); 671 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 673 else if (SSL_C_IS_EXPORT(sess->cipher))
|
s3_enc.c | 437 if (s->session->cipher != NULL) 439 if (s->session->cipher->algorithm_enc == SSL_eNULL) 443 if (s->session->cipher->algorithm_enc == SSL_RC4) 513 bs=EVP_CIPHER_block_size(ds->cipher);
|
kssl.c | [all...] |
ssltest.c | 113 * ECC cipher suite support in OpenSSL originally developed by 298 static char *cipher=NULL; variable 360 fprintf(stderr," -cipher arg - The cipher list\n"); 371 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n"); 381 BIO_printf(bio_stdout,"%s%s, cipher %s %s", 557 cipher = 0; 713 else if (strcmp(*argv,"-cipher") == 0) 716 cipher= *(++argv); 792 /* ensure that the cipher list are correctly sorted and exit * [all...] |
/external/pdfium/core/include/fpdfapi/ |
fpdf_parser.h | 621 virtual FX_BOOL GetCryptInfo(int& cipher, FX_LPCBYTE& buffer, int& keylen) = 0;
648 virtual FX_BOOL GetCryptInfo(int& cipher, FX_LPCBYTE& buffer, int& keylen);
687 FX_BOOL LoadDict(CPDF_Dictionary* pEncryptDict, FX_DWORD type, int& cipher, int& key_len);
743 FX_BOOL Init(int cipher, FX_LPCBYTE key, int keylen);
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
s_server.c | 113 * ECC cipher suite support in OpenSSL originally developed by 267 static char *cipher=NULL; variable 429 cipher=NULL; 501 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n"); 502 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n"); [all...] |
req.c | 181 const EVP_CIPHER *cipher=NULL; local 199 cipher=EVP_des_ede3_cbc(); 747 cipher=NULL; 748 if (nodes) cipher=NULL; 752 if (!PEM_write_bio_PrivateKey(out,pkey,cipher, [all...] |
s_client.c | 342 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n"); 343 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n"); 580 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local 904 else if (strcmp(*argv,"-cipher") == 0) 907 cipher= *(++argv); 1006 if (cipher) 1008 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n"); 1011 cipher = "PSK"; [all...] |
/external/openssl/apps/ |
s_server.c | 113 * ECC cipher suite support in OpenSSL originally developed by 267 static char *cipher=NULL; variable 429 cipher=NULL; 501 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n"); 502 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n"); [all...] |
req.c | 181 const EVP_CIPHER *cipher=NULL; local 199 cipher=EVP_des_ede3_cbc(); 746 cipher=NULL; 747 if (nodes) cipher=NULL; 751 if (!PEM_write_bio_PrivateKey(out,pkey,cipher, [all...] |
s_client.c | 342 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n"); 343 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n"); 582 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local 915 else if (strcmp(*argv,"-cipher") == 0) 918 cipher= *(++argv); 1017 if (cipher) 1019 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n"); 1022 cipher = "PSK"; [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_madwifi.c | 253 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 257 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 259 printf("Unable to set group key cipher to %u\n", v); 423 u_int8_t cipher; local 433 cipher = IEEE80211_CIPHER_WEP; 435 cipher = IEEE80211_CIPHER_TKIP; 437 cipher = IEEE80211_CIPHER_AES_CCM; 451 wk.ik_type = cipher; [all...] |
/external/openssl/crypto/cms/ |
cms_pwri.c | 108 kekciph = env->encryptedContentInfo->cipher; 122 /* Setup algorithm identifier for cipher */ 377 /* Fixup cipher based on AlgorithmIdentifier to set IV etc */
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 440 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher " 547 char cipher[64]; local 551 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 553 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher " 558 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL; [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite 22 * @cipher_suite: New cipher suite 25 * This function is used to prepare TLS record layer for cipher suite change. 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 55 data = tls_get_cipher_data(suite->cipher); 68 * tlsv1_record_change_write_cipher - TLS record layer: Change write cipher 70 * Returns: 0 on success (cipher changed), -1 on failure 72 * This function changes TLS record layer to use the new cipher suite 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 92 "cipher"); [all...] |
/prebuilts/eclipse/maven/apache-maven-3.2.1/lib/ |
maven-embedder-3.2.1.jar | |