HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 226 - 250 of 331) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_ssl.py 180 with self.assertRaisesRegexp(ssl.SSLError, "No cipher can be selected"):
393 (remote, s.cipher()))
432 cipher = self.sslconn.cipher()
434 sys.stdout.write(" server: connection cipher is now " + str(cipher) + "\n")
768 self.request.cipher(),
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
ssl.py 183 def cipher(self): member in class:SSLSocket
188 return self._sslobj.cipher()
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_ssl.py 180 with self.assertRaisesRegexp(ssl.SSLError, "No cipher can be selected"):
393 (remote, s.cipher()))
432 cipher = self.sslconn.cipher()
434 sys.stdout.write(" server: connection cipher is now " + str(cipher) + "\n")
768 self.request.cipher(),
    [all...]
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
dtlstransportchannel.h 165 // Find out which DTLS-SRTP cipher was negotiated
166 virtual bool GetSrtpCipher(std::string* cipher);
p2ptransportchannel.h 128 // Find out which DTLS-SRTP cipher was negotiated
129 virtual bool GetSrtpCipher(std::string* cipher) {
  /external/chromium_org/third_party/openssl/openssl/ssl/
s2_clnt.c 479 * (highest priority) cipher the server sends, otherwise
510 s->session->cipher=sk_SSL_CIPHER_value(prio,i);
549 /* CIPHER **cipher;*/
581 s2n(n,p); /* cipher spec num bytes */
637 i=ssl_put_cipher_by_char(s,sess->cipher,p);
671 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC)
673 else if (SSL_C_IS_EXPORT(sess->cipher))
s3_enc.c 444 if (s->session->cipher != NULL)
446 if (s->session->cipher->algorithm_enc == SSL_eNULL)
450 if (s->session->cipher->algorithm_enc == SSL_RC4)
520 bs=EVP_CIPHER_block_size(ds->cipher);
kssl.c     [all...]
ssltest.c 113 * ECC cipher suite support in OpenSSL originally developed by
298 static char *cipher=NULL; variable
360 fprintf(stderr," -cipher arg - The cipher list\n");
371 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n");
381 BIO_printf(bio_stdout,"%s%s, cipher %s %s",
557 cipher = 0;
713 else if (strcmp(*argv,"-cipher") == 0)
716 cipher= *(++argv);
792 /* ensure that the cipher list are correctly sorted and exit *
    [all...]
  /external/openssl/ssl/
s2_clnt.c 479 * (highest priority) cipher the server sends, otherwise
510 s->session->cipher=sk_SSL_CIPHER_value(prio,i);
549 /* CIPHER **cipher;*/
581 s2n(n,p); /* cipher spec num bytes */
637 i=ssl_put_cipher_by_char(s,sess->cipher,p);
671 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC)
673 else if (SSL_C_IS_EXPORT(sess->cipher))
s3_enc.c 437 if (s->session->cipher != NULL)
439 if (s->session->cipher->algorithm_enc == SSL_eNULL)
443 if (s->session->cipher->algorithm_enc == SSL_RC4)
513 bs=EVP_CIPHER_block_size(ds->cipher);
kssl.c     [all...]
ssltest.c 113 * ECC cipher suite support in OpenSSL originally developed by
298 static char *cipher=NULL; variable
360 fprintf(stderr," -cipher arg - The cipher list\n");
371 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n");
381 BIO_printf(bio_stdout,"%s%s, cipher %s %s",
557 cipher = 0;
713 else if (strcmp(*argv,"-cipher") == 0)
716 cipher= *(++argv);
792 /* ensure that the cipher list are correctly sorted and exit *
    [all...]
  /external/pdfium/core/include/fpdfapi/
fpdf_parser.h 621 virtual FX_BOOL GetCryptInfo(int& cipher, FX_LPCBYTE& buffer, int& keylen) = 0;
648 virtual FX_BOOL GetCryptInfo(int& cipher, FX_LPCBYTE& buffer, int& keylen);
687 FX_BOOL LoadDict(CPDF_Dictionary* pEncryptDict, FX_DWORD type, int& cipher, int& key_len);
743 FX_BOOL Init(int cipher, FX_LPCBYTE key, int keylen);
  /external/chromium_org/third_party/openssl/openssl/apps/
s_server.c 113 * ECC cipher suite support in OpenSSL originally developed by
267 static char *cipher=NULL; variable
429 cipher=NULL;
501 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n");
502 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n");
    [all...]
req.c 181 const EVP_CIPHER *cipher=NULL; local
199 cipher=EVP_des_ede3_cbc();
747 cipher=NULL;
748 if (nodes) cipher=NULL;
752 if (!PEM_write_bio_PrivateKey(out,pkey,cipher,
    [all...]
s_client.c 342 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n");
343 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n");
580 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local
904 else if (strcmp(*argv,"-cipher") == 0)
907 cipher= *(++argv);
1006 if (cipher)
1008 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
1011 cipher = "PSK";
    [all...]
  /external/openssl/apps/
s_server.c 113 * ECC cipher suite support in OpenSSL originally developed by
267 static char *cipher=NULL; variable
429 cipher=NULL;
501 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n");
502 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n");
    [all...]
req.c 181 const EVP_CIPHER *cipher=NULL; local
199 cipher=EVP_des_ede3_cbc();
746 cipher=NULL;
747 if (nodes) cipher=NULL;
751 if (!PEM_write_bio_PrivateKey(out,pkey,cipher,
    [all...]
s_client.c 342 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n");
343 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n");
582 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local
915 else if (strcmp(*argv,"-cipher") == 0)
918 cipher= *(++argv);
1017 if (cipher)
1019 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
1022 cipher = "PSK";
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_madwifi.c 253 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
257 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
259 printf("Unable to set group key cipher to %u\n", v);
423 u_int8_t cipher; local
433 cipher = IEEE80211_CIPHER_WEP;
435 cipher = IEEE80211_CIPHER_TKIP;
437 cipher = IEEE80211_CIPHER_AES_CCM;
451 wk.ik_type = cipher;
    [all...]
  /external/openssl/crypto/cms/
cms_pwri.c 108 kekciph = env->encryptedContentInfo->cipher;
122 /* Setup algorithm identifier for cipher */
377 /* Fixup cipher based on AlgorithmIdentifier to set IV etc */
  /external/wpa_supplicant_8/src/eap_server/
eap_server_fast.c 440 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher "
547 char cipher[64]; local
551 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher))
553 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher "
558 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite
22 * @cipher_suite: New cipher suite
25 * This function is used to prepare TLS record layer for cipher suite change.
36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
55 data = tls_get_cipher_data(suite->cipher);
68 * tlsv1_record_change_write_cipher - TLS record layer: Change write cipher
70 * Returns: 0 on success (cipher changed), -1 on failure
72 * This function changes TLS record layer to use the new cipher suite
77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
92 "cipher");
    [all...]
  /prebuilts/eclipse/maven/apache-maven-3.2.1/lib/
maven-embedder-3.2.1.jar 

Completed in 739 milliseconds

1 2 3 4 5 6 7 8 91011>>