/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
pk7_doit.c | 288 evp_cipher=p7->d.signed_and_enveloped->enc_data->cipher; 299 evp_cipher=p7->d.enveloped->enc_data->cipher;
|
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 288 evp_cipher=p7->d.signed_and_enveloped->enc_data->cipher; 299 evp_cipher=p7->d.enveloped->enc_data->cipher;
|
/external/chromium_org/net/third_party/nss/ssl/ |
sslimpl.h | 286 ** SSL3 cipher suite policy and preference struct. 471 /* The SSL bulk cipher definition */ 490 cipher_missing /* reserved for no such supported cipher */ 561 * the cipher spec. Note that this is a ring buffer but left and 660 /* Stuff used to recreate key and read/write cipher objects */ 773 SSL3BulkCipher cipher; member in struct:ssl3BulkCipherDefStr [all...] |
/external/conscrypt/src/main/native/ |
org_conscrypt_NativeCrypto.cpp | 7711 SSL_CIPHER* cipher = to_SSL_CIPHER(env, ssl_cipher_address, true); local 7719 SSL_CIPHER* cipher = to_SSL_CIPHER(env, ssl_cipher_address, true); local 7761 const SSL_CIPHER* cipher = ssl_method->get_cipher(j); local 9444 const SSL_CIPHER* cipher = ssl_session->cipher; local [all...] |
/external/google-tv-pairing-protocol/java/jar/ |
bcprov-jdk15-143.jar | |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 323 * to the default cipher setup will also be included here. 332 /* The following cipher list is used by default. 333 * It also is substituted when an application-defined cipher list string 383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); 435 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 451 * Cipher OCTET STRING, -- the 3 byte cipher ID 522 const SSL_CIPHER *cipher; member in struct:ssl_session_st 525 * the 'cipher' structure * [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s3_cbc.c | 104 * block_size: the block size of the cipher used to encrypt the record. 138 * block_size: the block size of the cipher used to encrypt the record. 188 if (EVP_CIPHER_flags(s->enc_read_ctx->cipher)&EVP_CIPH_FLAG_AEAD_CIPHER)
|
s3_clnt.c | 120 * ECC cipher suite support in OpenSSL originally written by 441 * authentication in ECDH cipher suites with 491 s->session->cipher=s->s3->tmp.new_cipher; 990 s->session->cipher = pref_cipher ? 1036 /* unknown cipher */ 1055 /* we did not say we would use this cipher */ 1061 /* Depending on the session caching (internal/external), the cipher 1064 if (s->session->cipher) 1065 s->session->cipher_id = s->session->cipher->id; [all...] |
ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 323 * to the default cipher setup will also be included here. 332 /* The following cipher list is used by default. 333 * It also is substituted when an application-defined cipher list string 383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); 435 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 451 * Cipher OCTET STRING, -- the 3 byte cipher ID 522 const SSL_CIPHER *cipher; member in struct:ssl_session_st 525 * the 'cipher' structure * [all...] |
d1_both.c | 280 (EVP_CIPHER_mode( s->enc_write_ctx->cipher) & EVP_CIPH_CBC_MODE)) 281 blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher); [all...] |
ssl_locl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 282 * Use the according functions for cipher management instead. 345 /* Not a real MAC, just an indication it is part of cipher */ 385 * indicates that the cipher is implemented via an EVP_AEAD. */ 400 * Export and cipher strength information. For each cipher we have to decide 404 * Independent of the export flag the cipher strength is sorted into classes. 406 * is at 56bit (SSL_EXP56). If the exportable cipher class is going to change 433 * Macros to check the export status and cipher strength for export ciphers. 437 * *_EXPORT40/56 macros are used to check whether a certain cipher strengt [all...] |
/external/openssl/include/openssl/ |
ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 322 * to the default cipher setup will also be included here. 331 /* The following cipher list is used by default. 332 * It also is substituted when an application-defined cipher list string 382 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); 432 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 448 * Cipher OCTET STRING, -- the 3 byte cipher ID 519 const SSL_CIPHER *cipher; member in struct:ssl_session_st 522 * the 'cipher' structure * [all...] |
/external/openssl/ssl/ |
s3_cbc.c | 104 * block_size: the block size of the cipher used to encrypt the record. 138 * block_size: the block size of the cipher used to encrypt the record. 188 if (EVP_CIPHER_flags(s->enc_read_ctx->cipher)&EVP_CIPH_FLAG_AEAD_CIPHER)
|
ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 322 * to the default cipher setup will also be included here. 331 /* The following cipher list is used by default. 332 * It also is substituted when an application-defined cipher list string 382 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); 432 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 448 * Cipher OCTET STRING, -- the 3 byte cipher ID 519 const SSL_CIPHER *cipher; member in struct:ssl_session_st 522 * the 'cipher' structure * [all...] |
d1_both.c | 286 (EVP_CIPHER_mode( s->enc_write_ctx->cipher) & EVP_CIPH_CBC_MODE)) 287 blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher); [all...] |
s3_srvr.c | 120 * ECC cipher suite support in OpenSSL originally written by 473 * message only if the cipher suite is either 777 s->session->cipher=s->s3->tmp.new_cipher; 1123 /* we need a cipher if we are not resuming a session */ 1142 /* If it is a hit, check that the cipher is in the list */ 1146 id=s->session->cipher->id; [all...] |
s3_clnt.c | 120 * ECC cipher suite support in OpenSSL originally written by 430 * authentication in ECDH cipher suites with 480 s->session->cipher=s->s3->tmp.new_cipher; 976 s->session->cipher = pref_cipher ? 1022 /* unknown cipher */ 1041 /* we did not say we would use this cipher */ 1047 /* Depending on the session caching (internal/external), the cipher 1050 if (s->session->cipher) 1051 s->session->cipher_id = s->session->cipher->id; [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon37358
|
/prebuilts/sdk/tools/lib/ |
signapk.jar | |
/prebuilts/devtools/tools/lib/ |
bcprov-jdk15on-1.48.jar | |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/ |
bcprov-jdk15on-1.48.jar | |
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | [all...] |
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
mediasession.cc | 87 static bool CreateCryptoParams(int tag, const std::string& cipher, 96 out->cipher_suite = cipher; [all...] |
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/mod_pywebsocket/ |
standalone.py | 576 # Print cipher in use. Handshake is done on accept. 577 self._logger.debug('Cipher: %s', accepted_socket.cipher()) 581 # We cannot print the cipher in use. pyOpenSSL doesn't provide [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.equinox.security_1.0.200.v20100503.jar | |