/external/wpa_supplicant_8/src/ap/ |
ap_config.c | 888 int cipher = WPA_CIPHER_NONE; local 892 cipher = bss->default_wep_key_len >= 13 ? 894 bss->wpa_group = cipher; 895 bss->wpa_pairwise = cipher; 896 bss->rsn_pairwise = cipher; 898 int cipher = WPA_CIPHER_WEP40; local 900 cipher = WPA_CIPHER_WEP104; 902 bss->wpa_group = cipher; 903 bss->wpa_pairwise = cipher; 904 bss->rsn_pairwise = cipher; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
PKCS12KeyStoreSpi.java | 38 import javax.crypto.Cipher; 605 Cipher cipher = Cipher.getInstance(algorithm.getId(), bcProvider); local 607 cipher.init(Cipher.UNWRAP_MODE, k, defParams); 610 return (PrivateKey)cipher.unwrap(data, "", Cipher.PRIVATE_KEY); 615 Cipher cipher = createCipher(Cipher.UNWRAP_MODE, password, algId) local 647 Cipher cipher = Cipher.getInstance(algorithm, bcProvider); local 686 Cipher cipher = Cipher.getInstance(algorithm.getId(), bcProvider); local 700 Cipher cipher = createCipher(Cipher.DECRYPT_MODE, password, algId); local 734 Cipher cipher = Cipher.getInstance(alg.getEncryptionScheme().getAlgorithm().getId()); local [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
rawtransportchannel.h | 130 // Find out which DTLS-SRTP cipher was negotiated 131 virtual bool GetSrtpCipher(std::string* cipher) {
|
transportchannelproxy.cc | 174 bool TransportChannelProxy::GetSrtpCipher(std::string* cipher) { 179 return impl_->GetSrtpCipher(cipher);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server.c | 493 * tlsv1_server_get_cipher - Get current cipher name 495 * @buf: Buffer for the cipher name 499 * Get the name of the currently used cipher. 504 char *cipher; local 508 cipher = "RC4-MD5"; 511 cipher = "RC4-SHA"; 514 cipher = "DES-CBC-SHA"; 517 cipher = "DES-CBC3-SHA"; 520 cipher = "ADH-AES-128-SHA"; 523 cipher = "AES-256-SHA" [all...] |
/external/chromium_org/net/socket/ |
ssl_client_socket_openssl.cc | 56 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; } 569 const SSL_CIPHER* cipher = SSL_get_current_cipher(ssl_); local 570 CHECK(cipher); 571 ssl_info->security_bits = SSL_CIPHER_get_bits(cipher, NULL); 575 SSL_CIPHER_get_id(cipher), 591 DVLOG(3) << "Encoded connection status: cipher suite = " 711 // directly remove a cipher by ID. 716 // and HMAC-SHA384 cipher suites, not GCM cipher suites with SHA256 or SHA38 723 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/krb5/ |
krb5_asn.c | 66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
|
/external/openssl/crypto/krb5/ |
krb5_asn.c | 66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
|
/external/chromium_org/third_party/openssl/openssl/crypto/pem/ |
pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon18503 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon18549 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
/external/openssl/crypto/cms/ |
cms_smime.c | 252 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, 257 if (!cipher) 265 if (!CMS_EncryptedData_set1_key(cms, cipher, key, keylen)) 574 const EVP_CIPHER *cipher, unsigned int flags) 579 cms = CMS_EnvelopedData_create(cipher);
|
cms.h | 161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, 178 const EVP_CIPHER *cipher, unsigned int flags); variable 193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
|
/external/openssl/crypto/pem/ |
pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon32104 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
/external/openssl/include/openssl/ |
pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon32147 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
cms.h | 161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, 178 const EVP_CIPHER *cipher, unsigned int flags); variable 193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
|
pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
/external/chromium_org/third_party/libsrtp/srtp/srtp/ |
srtp.c | 118 /* allocate cipher */ 149 * the cipher 201 /* deallocate cipher, if it is not the same as that in template */ 230 * deallocate rtcp cipher, if it is not the same as that in 270 * initializes it using the cipher and auth of the stream_template 291 /* set cipher and auth pointers to those of the template */ 333 * srtp_kdf_init(&kdf, cipher_id, k, keylen) initializes kdf to use cipher 360 cipher_t *cipher; /* cipher used for key derivation */ member in struct:__anon16491 367 stat = crypto_kernel_alloc_cipher(cipher_id, &kdf->cipher, length) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 363 const EVP_CIPHER *cipher; local 372 cipher = EVP_rc4(); 379 cipher = EVP_aes_128_cbc(); 382 cipher = EVP_aes_192_cbc(); 385 cipher = EVP_aes_256_cbc(); 395 cipher = EVP_des_ede3_cbc(); 398 cipher = EVP_des_cbc(); 403 cipher = EVP_rc2_ecb(); 413 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) || 423 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NULL, NULL, NULL) | [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ap.c | 269 int cipher = WPA_CIPHER_NONE; local 273 cipher = bss->default_wep_key_len >= 13 ? 275 bss->wpa_group = cipher; 276 bss->wpa_pairwise = cipher; 277 bss->rsn_pairwise = cipher; 279 int cipher = WPA_CIPHER_WEP40; local 281 cipher = WPA_CIPHER_WEP104; 283 bss->wpa_group = cipher; 284 bss->wpa_pairwise = cipher; 285 bss->rsn_pairwise = cipher; [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer 193 switch (peer->cipher) { 199 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: " 203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", 682 peer->cipher = 0; 1054 * RSN IE is filled only with CCMP CIPHER 1057 * Regardless of the cipher used on the AP connection, select CCMP 1657 int cipher; local 2029 int cipher; local [all...] |
/external/openssl/ssl/ |
t1_enc.c | 653 if (s->session->cipher != NULL) 655 if (s->session->cipher->algorithm_enc == SSL_eNULL) 659 if (s->session->cipher->algorithm_enc == SSL_RC4) 755 bs=EVP_CIPHER_block_size(ds->cipher); 757 if (EVP_CIPHER_flags(ds->cipher)&EVP_CIPH_FLAG_AEAD_CIPHER) 818 ds->buf_len, ds->cipher->key_len, 820 ds->cipher->iv_len); 822 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]); 837 if ((EVP_CIPHER_flags(ds->cipher)&EVP_CIPH_FLAG_CUSTOM_CIPHER) [all...] |
/external/chromium_org/content/child/webcrypto/ |
platform_crypto_openssl.cc | 108 const EVP_CIPHER* const cipher = GetAESCipherByKeyLength(key->key().size()); local 109 DCHECK(cipher); 112 cipher,
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
/external/openssl/crypto/pkcs7/ |
pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|