/external/chromium_org/net/third_party/nss/ssl/ |
sslcon.c | 61 PRUint8 keyLen; /* cipher symkey size in bytes. */ 118 * lsb corresponds to first cipher suite in allCipherSuites[]. 141 /* Construct a socket's list of cipher specs from the global default values. 173 /* ask SSL3 how many cipher suites it has. */ 179 /* Allocate memory to hold cipher specs */ 193 /* fill in cipher specs for SSL2 cipher suites */ 218 ** (e.g. SSL2 or SSL3) is logically enabled, but all its cipher suites 221 ** if no cipher suites are found, it sets the error code and returns 649 ssl2_SendSessionKeyMessage(sslSocket *ss, int cipher, int keySize 2021 int cipher; local 3223 int cipher; local [all...] |
/external/chromium_org/chrome/browser/ui/website_settings/ |
website_settings.cc | 506 const char *key_exchange, *cipher, *mac; local 509 &key_exchange, &cipher, &mac, &is_aead, cipher_suite); 515 ASCIIToUTF16(cipher), ASCIIToUTF16(key_exchange)); 519 ASCIIToUTF16(cipher), ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));
|
/external/chromium_org/jingle/glue/ |
channel_socket_adapter_unittest.cc | 48 MOCK_METHOD1(GetSrtpCipher, bool(std::string* cipher));
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
pk7_lib.c | 591 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) 610 /* Check cipher OID exists and has data in it*/ 611 i = EVP_CIPHER_type(cipher); 617 ec->cipher = cipher;
|
pk7_smime.c | 145 /* Check to see if a cipher exists and if so add S/MIME capabilities */ 492 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, 506 if (!PKCS7_set_cipher(p7, cipher)) {
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s2_enc.c | 138 /* check for NULL cipher */ 142 bs=ds->cipher->block_size;
|
ssl_sess.c | 586 if (ret->cipher == NULL) 595 ret->cipher=ssl_get_cipher_by_char(s,&(buf[2])); 597 ret->cipher=ssl_get_cipher_by_char(s,&(buf[1])); 598 if (ret->cipher == NULL) 915 STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) [all...] |
s23_clnt.c | 259 SSL_CIPHER *cipher; local 265 cipher = sk_SSL_CIPHER_value(ciphers, i); 266 if (cipher->algorithm_ssl == SSL_SSLV2)
|
/external/openssl/crypto/cms/ |
cms_env.c | 120 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher) 131 cipher, NULL, 0)) 821 /* If error or no cipher end of processing */ 823 if (!ret || !ec->cipher) 865 ec->cipher = NULL;
|
cms_lcl.h | 175 const EVP_CIPHER *cipher; member in struct:CMS_EncryptedContentInfo_st 456 const EVP_CIPHER *cipher,
|
/external/openssl/crypto/pkcs7/ |
pk7_lib.c | 591 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) 610 /* Check cipher OID exists and has data in it*/ 611 i = EVP_CIPHER_type(cipher); 617 ec->cipher = cipher;
|
pk7_smime.c | 145 /* Check to see if a cipher exists and if so add S/MIME capabilities */ 492 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, 506 if (!PKCS7_set_cipher(p7, cipher)) {
|
/external/openssl/ssl/ |
s2_enc.c | 138 /* check for NULL cipher */ 142 bs=ds->cipher->block_size;
|
ssl_sess.c | 598 if (ret->cipher == NULL) 607 ret->cipher=ssl_get_cipher_by_char(s,&(buf[2])); 609 ret->cipher=ssl_get_cipher_by_char(s,&(buf[1])); 610 if (ret->cipher == NULL) 927 STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) [all...] |
s23_clnt.c | 259 SSL_CIPHER *cipher; local 265 cipher = sk_SSL_CIPHER_value(ciphers, i); 266 if (cipher->algorithm_ssl == SSL_SSLV2)
|
/libcore/support/src/test/java/libcore/java/security/ |
StandardNames.java | 43 * client and server auth types, cipher suites. 79 * RFC 5746's Signaling Cipher Suite Value to indicate a request for secure renegotiation 86 * signaling cipher suite value (SCSV) to indicate that this request is a 93 * A map from algorithm type (e.g. Cipher) to a set of algorithms (e.g. AES, DES, ...) 159 provide("Cipher", "AES"); 162 provide("Cipher", "AESWrap"); 163 provide("Cipher", "ARCFOUR"); 164 provide("Cipher", "Blowfish"); 165 provide("Cipher", "DES"); 166 provide("Cipher", "DESede") [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
pkcs12.h | 181 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 223 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
pkcs12.h | 181 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 223 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
|
/external/openssl/crypto/pkcs12/ |
pkcs12.h | 181 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 223 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
|
/external/openssl/include/openssl/ |
pkcs12.h | 181 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 223 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
|
/external/chromium_org/chromeos/network/onc/ |
onc_utils.cc | 65 std::string cipher; local 73 !root.GetString(encrypted::kCipher, &cipher) || 88 cipher != encrypted::kAES256 ||
|
/external/wpa_supplicant_8/src/drivers/ |
driver_atheros.c | 287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 293 printf("Unable to set group key cipher to %u\n", v); 474 u_int8_t cipher; local 485 cipher = IEEE80211_CIPHER_WEP; 488 cipher = IEEE80211_CIPHER_TKIP; 491 cipher = IEEE80211_CIPHER_AES_CCM; 495 cipher = IEEE80211_CIPHER_AES_CCM_256; 498 cipher = IEEE80211_CIPHER_AES_GCM; 501 cipher = IEEE80211_CIPHER_AES_GCM_256 [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
dtlstransportchannel.cc | 307 LOG(LS_ERROR) << "Failed to get the current SRTP cipher for DTLS channel"; 321 << "current cipher = " << current_srtp_cipher << " and " 338 bool DtlsTransportChannelWrapper::GetSrtpCipher(std::string* cipher) { 343 return dtls_->GetDtlsSrtpCipher(cipher);
|
fakesession.h | 244 virtual bool GetSrtpCipher(std::string* cipher) { 246 *cipher = chosen_srtp_cipher_;
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
ssl.py | 183 def cipher(self): member in class:SSLSocket 188 return self._sslobj.cipher()
|