/build/tools/signapk/ |
SignApk.java | 77 import javax.crypto.Cipher; 209 Cipher cipher = Cipher.getInstance(epkInfo.getAlgName()); local 210 cipher.init(Cipher.DECRYPT_MODE, key, epkInfo.getAlgParameters()); 213 return epkInfo.getKeySpec(cipher); [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
dtlstransportchannel_unittest.cc | 221 std::string cipher; local 223 bool rv = (*it)->GetSrtpCipher(&cipher); 227 ASSERT_EQ(cipher, expected_cipher);
|
/external/chromium_org/third_party/openssl/openssl/crypto/threads/ |
mttest.c | 137 static char *cipher=NULL; variable 272 if (cipher == NULL && OPENSSL_issetugid() == 0) 273 cipher=getenv("SSL_CIPHER");
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s2_srvr.c | 401 s->session->cipher= cp; 453 is_export=SSL_C_IS_EXPORT(s->session->cipher); 462 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 493 /* incorrect number of key bytes for non export cipher */ 589 /* get session-id before cipher stuff so we can get out session 678 /* done cipher selection */ 783 s2n(n,p); /* add cipher length */
|
s3_pkt.c | 674 clear=s->enc_write_ctx?0:1; /* must be AEAD cipher */ 718 /* extra fragment would be couple of cipher blocks, 936 * Change cipher spec protocol 1135 (s->session != NULL) && (s->session->cipher != NULL)) [all...] |
s3_srvr.c | 120 * ECC cipher suite support in OpenSSL originally written by 469 * message only if the cipher suite is either 763 s->session->cipher=s->s3->tmp.new_cipher; 1108 /* we need a cipher if we are not resuming a session */ 1127 /* If it is a hit, check that the cipher is in the list */ 1131 id=s->session->cipher->id; 1155 /* Special case as client bug workaround: the previously used cipher may 1157 * continue using a cipher that before wasn't chosen due to server 1158 * preferences. We'll have to reject the connection if the cipher is not 1163 s->session->cipher = c [all...] |
ssl_lib.c | 115 * ECC cipher suite support in OpenSSL originally developed by 207 * the old cipher. It is sort of a SSL_clear_lite :-) */ [all...] |
d1_pkt.c | 737 * Change cipher spec protocol 1031 (s->session != NULL) && (s->session->cipher != NULL)) [all...] |
/external/openssl/crypto/threads/ |
mttest.c | 137 static char *cipher=NULL; variable 272 if (cipher == NULL && OPENSSL_issetugid() == 0) 273 cipher=getenv("SSL_CIPHER");
|
/external/openssl/ssl/ |
s2_srvr.c | 401 s->session->cipher= cp; 453 is_export=SSL_C_IS_EXPORT(s->session->cipher); 462 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 493 /* incorrect number of key bytes for non export cipher */ 589 /* get session-id before cipher stuff so we can get out session 678 /* done cipher selection */ 783 s2n(n,p); /* add cipher length */
|
s3_pkt.c | 748 /* The extra fragment would be couple of cipher blocks, and 960 * Change cipher spec protocol [all...] |
ssl_lib.c | 115 * ECC cipher suite support in OpenSSL originally developed by 207 * the old cipher. It is sort of a SSL_clear_lite :-) */ [all...] |
d1_pkt.c | 740 * Change cipher spec protocol 1040 (s->session != NULL) && (s->session->cipher != NULL)) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 200 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local 203 wpa_s->pairwise_cipher = cipher; 205 wpa_s->group_cipher = cipher;
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
e_aes.c | 235 mode = ctx->cipher->flags & EVP_CIPH_MODE; 276 size_t bl = ctx->cipher->block_size; 502 mode = ctx->cipher->flags & EVP_CIPH_MODE; 592 size_t bl = ctx->cipher->block_size; 708 gctx->ivlen = c->cipher->iv_len; [all...] |
/external/openssl/crypto/evp/ |
e_aes.c | 235 mode = ctx->cipher->flags & EVP_CIPH_MODE; 276 size_t bl = ctx->cipher->block_size; 534 mode = ctx->cipher->flags & EVP_CIPH_MODE; 657 size_t bl = ctx->cipher->block_size; 773 gctx->ivlen = c->cipher->iv_len; [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast.c | 1572 char cipher[80]; local [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
ssl3ext.c | 2082 PRUint16 cipher = 0; local [all...] |
sslsock.c | 1135 /* function tells us if the cipher suite is one that we no longer support. */ 1337 const PRUint16 *cipher; local [all...] |
/external/ppp/pppd/ |
eap.c | 651 u_char clear[8], cipher[8], dig[SHA_DIGESTSIZE], *optr, *cp; local 780 if (!DesEncrypt(clear, cipher)) { 786 outp += b64enc(&b64, cipher, 8, outp); 788 (void) DesEncrypt(cp, cipher); 789 outp += b64enc(&b64, cipher, 8, outp); 800 (void) DesEncrypt(clear, cipher); 801 outp += b64enc(&b64, cipher, 8, outp); [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st [all...] |
/external/openssl/crypto/x509/ |
x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st [all...] |
/external/openssl/include/openssl/ |
x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon37391
|