HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 176 - 200 of 331) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/wpa_supplicant_8/src/ap/
ap_config.c 888 int cipher = WPA_CIPHER_NONE; local
892 cipher = bss->default_wep_key_len >= 13 ?
894 bss->wpa_group = cipher;
895 bss->wpa_pairwise = cipher;
896 bss->rsn_pairwise = cipher;
898 int cipher = WPA_CIPHER_WEP40; local
900 cipher = WPA_CIPHER_WEP104;
902 bss->wpa_group = cipher;
903 bss->wpa_pairwise = cipher;
904 bss->rsn_pairwise = cipher;
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/
PKCS12KeyStoreSpi.java 38 import javax.crypto.Cipher;
605 Cipher cipher = Cipher.getInstance(algorithm.getId(), bcProvider); local
607 cipher.init(Cipher.UNWRAP_MODE, k, defParams);
610 return (PrivateKey)cipher.unwrap(data, "", Cipher.PRIVATE_KEY);
615 Cipher cipher = createCipher(Cipher.UNWRAP_MODE, password, algId) local
647 Cipher cipher = Cipher.getInstance(algorithm, bcProvider); local
686 Cipher cipher = Cipher.getInstance(algorithm.getId(), bcProvider); local
700 Cipher cipher = createCipher(Cipher.DECRYPT_MODE, password, algId); local
734 Cipher cipher = Cipher.getInstance(alg.getEncryptionScheme().getAlgorithm().getId()); local
    [all...]
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
rawtransportchannel.h 130 // Find out which DTLS-SRTP cipher was negotiated
131 virtual bool GetSrtpCipher(std::string* cipher) {
transportchannelproxy.cc 174 bool TransportChannelProxy::GetSrtpCipher(std::string* cipher) {
179 return impl_->GetSrtpCipher(cipher);
  /external/wpa_supplicant_8/src/tls/
tlsv1_server.c 493 * tlsv1_server_get_cipher - Get current cipher name
495 * @buf: Buffer for the cipher name
499 * Get the name of the currently used cipher.
504 char *cipher; local
508 cipher = "RC4-MD5";
511 cipher = "RC4-SHA";
514 cipher = "DES-CBC-SHA";
517 cipher = "DES-CBC3-SHA";
520 cipher = "ADH-AES-128-SHA";
523 cipher = "AES-256-SHA"
    [all...]
  /external/chromium_org/net/socket/
ssl_client_socket_openssl.cc 56 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; }
569 const SSL_CIPHER* cipher = SSL_get_current_cipher(ssl_); local
570 CHECK(cipher);
571 ssl_info->security_bits = SSL_CIPHER_get_bits(cipher, NULL);
575 SSL_CIPHER_get_id(cipher),
591 DVLOG(3) << "Encoded connection status: cipher suite = "
711 // directly remove a cipher by ID.
716 // and HMAC-SHA384 cipher suites, not GCM cipher suites with SHA256 or SHA38
723 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/krb5/
krb5_asn.c 66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
  /external/openssl/crypto/krb5/
krb5_asn.c 66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
  /external/chromium_org/third_party/openssl/openssl/crypto/pem/
pem.h 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon18503
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
pem.h 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon18549
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
pkcs7.h 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
  /external/openssl/crypto/cms/
cms_smime.c 252 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher,
257 if (!cipher)
265 if (!CMS_EncryptedData_set1_key(cms, cipher, key, keylen))
574 const EVP_CIPHER *cipher, unsigned int flags)
579 cms = CMS_EnvelopedData_create(cipher);
cms.h 161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher,
178 const EVP_CIPHER *cipher, unsigned int flags); variable
193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
  /external/openssl/crypto/pem/
pem.h 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon32104
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
  /external/openssl/include/openssl/
pem.h 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon32147
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
cms.h 161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher,
178 const EVP_CIPHER *cipher, unsigned int flags); variable
193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
pkcs7.h 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
  /external/chromium_org/third_party/libsrtp/srtp/srtp/
srtp.c 118 /* allocate cipher */
149 * the cipher
201 /* deallocate cipher, if it is not the same as that in template */
230 * deallocate rtcp cipher, if it is not the same as that in
270 * initializes it using the cipher and auth of the stream_template
291 /* set cipher and auth pointers to those of the template */
333 * srtp_kdf_init(&kdf, cipher_id, k, keylen) initializes kdf to use cipher
360 cipher_t *cipher; /* cipher used for key derivation */ member in struct:__anon16491
367 stat = crypto_kernel_alloc_cipher(cipher_id, &kdf->cipher, length)
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_openssl.c 363 const EVP_CIPHER *cipher; local
372 cipher = EVP_rc4();
379 cipher = EVP_aes_128_cbc();
382 cipher = EVP_aes_192_cbc();
385 cipher = EVP_aes_256_cbc();
395 cipher = EVP_des_ede3_cbc();
398 cipher = EVP_des_cbc();
403 cipher = EVP_rc2_ecb();
413 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) ||
423 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NULL, NULL, NULL) |
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
ap.c 269 int cipher = WPA_CIPHER_NONE; local
273 cipher = bss->default_wep_key_len >= 13 ?
275 bss->wpa_group = cipher;
276 bss->wpa_pairwise = cipher;
277 bss->rsn_pairwise = cipher;
279 int cipher = WPA_CIPHER_WEP40; local
281 cipher = WPA_CIPHER_WEP104;
283 bss->wpa_group = cipher;
284 bss->wpa_pairwise = cipher;
285 bss->rsn_pairwise = cipher;
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer
193 switch (peer->cipher) {
199 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: "
203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
682 peer->cipher = 0;
1054 * RSN IE is filled only with CCMP CIPHER
1057 * Regardless of the cipher used on the AP connection, select CCMP
1657 int cipher; local
2029 int cipher; local
    [all...]
  /external/openssl/ssl/
t1_enc.c 653 if (s->session->cipher != NULL)
655 if (s->session->cipher->algorithm_enc == SSL_eNULL)
659 if (s->session->cipher->algorithm_enc == SSL_RC4)
755 bs=EVP_CIPHER_block_size(ds->cipher);
757 if (EVP_CIPHER_flags(ds->cipher)&EVP_CIPH_FLAG_AEAD_CIPHER)
818 ds->buf_len, ds->cipher->key_len,
820 ds->cipher->iv_len);
822 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
837 if ((EVP_CIPHER_flags(ds->cipher)&EVP_CIPH_FLAG_CUSTOM_CIPHER)
    [all...]
  /external/chromium_org/content/child/webcrypto/
platform_crypto_openssl.cc 108 const EVP_CIPHER* const cipher = GetAESCipherByKeyLength(key->key().size()); local
109 DCHECK(cipher);
112 cipher,
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/
pkcs7.h 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
  /external/openssl/crypto/pkcs7/
pkcs7.h 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable

Completed in 2985 milliseconds

1 2 3 4 5 6 78 91011>>