HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 251 - 275 of 331) sorted by null

<<11121314

  /build/tools/signapk/
SignApk.java 77 import javax.crypto.Cipher;
209 Cipher cipher = Cipher.getInstance(epkInfo.getAlgName()); local
210 cipher.init(Cipher.DECRYPT_MODE, key, epkInfo.getAlgParameters());
213 return epkInfo.getKeySpec(cipher);
    [all...]
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
dtlstransportchannel_unittest.cc 221 std::string cipher; local
223 bool rv = (*it)->GetSrtpCipher(&cipher);
227 ASSERT_EQ(cipher, expected_cipher);
  /external/chromium_org/third_party/openssl/openssl/crypto/threads/
mttest.c 137 static char *cipher=NULL; variable
272 if (cipher == NULL && OPENSSL_issetugid() == 0)
273 cipher=getenv("SSL_CIPHER");
  /external/chromium_org/third_party/openssl/openssl/ssl/
s2_srvr.c 401 s->session->cipher= cp;
453 is_export=SSL_C_IS_EXPORT(s->session->cipher);
462 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC)
493 /* incorrect number of key bytes for non export cipher */
589 /* get session-id before cipher stuff so we can get out session
678 /* done cipher selection */
783 s2n(n,p); /* add cipher length */
s3_pkt.c 674 clear=s->enc_write_ctx?0:1; /* must be AEAD cipher */
718 /* extra fragment would be couple of cipher blocks,
936 * Change cipher spec protocol
1135 (s->session != NULL) && (s->session->cipher != NULL))
    [all...]
s3_srvr.c 120 * ECC cipher suite support in OpenSSL originally written by
469 * message only if the cipher suite is either
763 s->session->cipher=s->s3->tmp.new_cipher;
1108 /* we need a cipher if we are not resuming a session */
1127 /* If it is a hit, check that the cipher is in the list */
1131 id=s->session->cipher->id;
1155 /* Special case as client bug workaround: the previously used cipher may
1157 * continue using a cipher that before wasn't chosen due to server
1158 * preferences. We'll have to reject the connection if the cipher is not
1163 s->session->cipher = c
    [all...]
ssl_lib.c 115 * ECC cipher suite support in OpenSSL originally developed by
207 * the old cipher. It is sort of a SSL_clear_lite :-) */
    [all...]
d1_pkt.c 737 * Change cipher spec protocol
1031 (s->session != NULL) && (s->session->cipher != NULL))
    [all...]
  /external/openssl/crypto/threads/
mttest.c 137 static char *cipher=NULL; variable
272 if (cipher == NULL && OPENSSL_issetugid() == 0)
273 cipher=getenv("SSL_CIPHER");
  /external/openssl/ssl/
s2_srvr.c 401 s->session->cipher= cp;
453 is_export=SSL_C_IS_EXPORT(s->session->cipher);
462 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC)
493 /* incorrect number of key bytes for non export cipher */
589 /* get session-id before cipher stuff so we can get out session
678 /* done cipher selection */
783 s2n(n,p); /* add cipher length */
s3_pkt.c 748 /* The extra fragment would be couple of cipher blocks, and
960 * Change cipher spec protocol
    [all...]
ssl_lib.c 115 * ECC cipher suite support in OpenSSL originally developed by
207 * the old cipher. It is sort of a SSL_clear_lite :-) */
    [all...]
d1_pkt.c 740 * Change cipher spec protocol
1040 (s->session != NULL) && (s->session->cipher != NULL))
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_glue.c 200 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local
203 wpa_s->pairwise_cipher = cipher;
205 wpa_s->group_cipher = cipher;
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
e_aes.c 235 mode = ctx->cipher->flags & EVP_CIPH_MODE;
276 size_t bl = ctx->cipher->block_size;
502 mode = ctx->cipher->flags & EVP_CIPH_MODE;
592 size_t bl = ctx->cipher->block_size;
708 gctx->ivlen = c->cipher->iv_len;
    [all...]
  /external/openssl/crypto/evp/
e_aes.c 235 mode = ctx->cipher->flags & EVP_CIPH_MODE;
276 size_t bl = ctx->cipher->block_size;
534 mode = ctx->cipher->flags & EVP_CIPH_MODE;
657 size_t bl = ctx->cipher->block_size;
773 gctx->ivlen = c->cipher->iv_len;
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_fast.c 1572 char cipher[80]; local
    [all...]
  /external/chromium_org/net/third_party/nss/ssl/
ssl3ext.c 2082 PRUint16 cipher = 0; local
    [all...]
sslsock.c 1135 /* function tells us if the cipher suite is one that we no longer support. */
1337 const PRUint16 *cipher; local
    [all...]
  /external/ppp/pppd/
eap.c 651 u_char clear[8], cipher[8], dig[SHA_DIGESTSIZE], *optr, *cp; local
780 if (!DesEncrypt(clear, cipher)) {
786 outp += b64enc(&b64, cipher, 8, outp);
788 (void) DesEncrypt(cp, cipher);
789 outp += b64enc(&b64, cipher, 8, outp);
800 (void) DesEncrypt(clear, cipher);
801 outp += b64enc(&b64, cipher, 8, outp);
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/x509/
x509.h 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st
    [all...]
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
x509.h 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st
    [all...]
  /external/openssl/crypto/x509/
x509.h 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st
    [all...]
  /external/openssl/include/openssl/
x509.h 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sake.c 23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon37391

Completed in 477 milliseconds

<<11121314