HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 201 - 225 of 225) sorted by null

1 2 3 4 5 6 7 89

  /external/chromium_org/third_party/boringssl/src/ssl/
s3_srvr.c 119 * ECC cipher suite support in OpenSSL originally written by
158 #include <openssl/cipher.h>
586 s->session->cipher=s->s3->tmp.new_cipher;
964 /* We need a cipher if we are not resuming a session. */
975 /* If it is a hit, check that the cipher is in the list */
979 unsigned long id = s->session->cipher->id;
992 /* we need to have the cipher in the cipher
1055 /* check if some cipher was preferred by call back */
1064 s->session->cipher=pref_cipher
    [all...]
ssl_lib.c 112 * ECC cipher suite support in OpenSSL originally developed by
203 * the old cipher. It is sort of a SSL_clear_lite :-) */
1187 * cipher suite value. */
    [all...]
s3_clnt.c 120 * ECC cipher suite support in OpenSSL originally written by
402 s->session->cipher=s->s3->tmp.new_cipher;
870 s->session->cipher = pref_cipher ?
912 /* unknown cipher */
923 /* If it is a disabled cipher we didn't send it in client hello,
938 /* we did not say we would use this cipher */
944 /* Depending on the session caching (internal/external), the cipher
947 if (s->session->cipher)
948 s->session->cipher_id = s->session->cipher->id;
    [all...]
d1_both.c 295 blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
    [all...]
ssl_sess.c 840 STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg), void *arg)
d1_pkt.c 708 * Change cipher spec protocol
952 (s->session != NULL) && (s->session->cipher != NULL))
    [all...]
  /external/chromium_org/net/third_party/nss/ssl/
sslimpl.h 286 ** SSL3 cipher suite policy and preference struct.
471 /* The SSL bulk cipher definition */
490 cipher_missing /* reserved for no such supported cipher */
561 * the cipher spec. Note that this is a ring buffer but left and
660 /* Stuff used to recreate key and read/write cipher objects */
773 SSL3BulkCipher cipher; member in struct:ssl3BulkCipherDefStr
    [all...]
ssl3con.c 110 /* This list of SSL3 cipher suites is sorted in descending order of
111 * precedence (desirability). It only includes cipher suites we implement.
112 * This table is modified by SSL3_SetPolicy(). The ordering of cipher suites
115 * Important: See bug 946147 before enabling, reordering, or adding any cipher
181 /* 56-bit DES "domestic" cipher suites */
215 * because it SSL_ImplementedCiphers includes SSL 2.0 cipher suites.
290 /* cipher calg k s type i b t n */
394 /* New TLS cipher suites */
656 /* See RFC 4346 A.5. Export cipher suites must not be used in TLS 1.1 or
657 * later. This set of cipher suites is similar to, but different from, th
1405 SSL3BulkCipher cipher; local
    [all...]
  /external/conscrypt/src/main/native/
org_conscrypt_NativeCrypto.cpp 7777 SSL_CIPHER* cipher = to_SSL_CIPHER(env, ssl_cipher_address, true); local
7785 SSL_CIPHER* cipher = to_SSL_CIPHER(env, ssl_cipher_address, true); local
7827 const SSL_CIPHER* cipher = ssl_method->get_cipher(j); local
9490 const SSL_CIPHER* cipher = ssl_session->cipher; local
    [all...]
  /external/google-tv-pairing-protocol/java/jar/
bcprov-jdk15-143.jar 
  /external/chromium_org/third_party/boringssl/src/crypto/cipher/
e_rc2.c 57 #include <openssl/cipher.h>
  /external/openssl/include/openssl/
ssl.h 113 * ECC cipher suite support in OpenSSL originally developed by
323 * to the default cipher setup will also be included here.
332 /* The following cipher list is used by default.
333 * It also is substituted when an application-defined cipher list string
383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg);
433 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);
449 * Cipher OCTET STRING, -- the 3 byte cipher ID
520 const SSL_CIPHER *cipher; member in struct:ssl_session_st
523 * the 'cipher' structure *
    [all...]
  /external/openssl/ssl/
ssl.h 113 * ECC cipher suite support in OpenSSL originally developed by
323 * to the default cipher setup will also be included here.
332 /* The following cipher list is used by default.
333 * It also is substituted when an application-defined cipher list string
383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg);
433 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);
449 * Cipher OCTET STRING, -- the 3 byte cipher ID
520 const SSL_CIPHER *cipher; member in struct:ssl_session_st
523 * the 'cipher' structure *
    [all...]
d1_both.c 286 (EVP_CIPHER_mode( s->enc_write_ctx->cipher) & EVP_CIPH_CBC_MODE))
287 blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
    [all...]
s3_srvr.c 120 * ECC cipher suite support in OpenSSL originally written by
473 * message only if the cipher suite is either
779 s->session->cipher=s->s3->tmp.new_cipher;
1125 /* we need a cipher if we are not resuming a session */
1144 /* If it is a hit, check that the cipher is in the list */
1148 id=s->session->cipher->id;
    [all...]
s3_clnt.c 120 * ECC cipher suite support in OpenSSL originally written by
430 * authentication in ECDH cipher suites with
480 s->session->cipher=s->s3->tmp.new_cipher;
977 s->session->cipher = pref_cipher ?
1024 /* unknown cipher */
1052 /* we did not say we would use this cipher */
1058 /* Depending on the session caching (internal/external), the cipher
1061 if (s->session->cipher)
1062 s->session->cipher_id = s->session->cipher->id;
    [all...]
ssl_locl.h 113 * ECC cipher suite support in OpenSSL originally developed by
282 * Use the according functions for cipher management instead.
345 /* Not a real MAC, just an indication it is part of cipher */
386 * Export and cipher strength information. For each cipher we have to decide
390 * Independent of the export flag the cipher strength is sorted into classes.
392 * is at 56bit (SSL_EXP56). If the exportable cipher class is going to change
419 * Macros to check the export status and cipher strength for export ciphers.
423 * *_EXPORT40/56 macros are used to check whether a certain cipher strength
859 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher);
    [all...]
d1_clnt.c 544 s->session->cipher=s->s3->tmp.new_cipher;
    [all...]
d1_srvr.c 716 s->session->cipher=s->s3->tmp.new_cipher;
967 /* put the cipher */
    [all...]
  /external/chromium_org/third_party/boringssl/src/include/openssl/
ssl.h 113 * ECC cipher suite support in OpenSSL originally developed by
245 * to the default cipher setup will also be included here.
253 /* The following cipher list is used by default.
254 * It also is substituted when an application-defined cipher list string
302 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg);
366 * Cipher OCTET STRING, -- the 3 byte cipher ID
432 const SSL_CIPHER *cipher; member in struct:ssl_session_st
435 * the 'cipher' structure */
754 * server picks the cipher and groups cannot be expressed on the wire. However
    [all...]
  /external/chromium_org/third_party/libjingle/source/talk/session/media/
mediasession.cc 87 static bool CreateCryptoParams(int tag, const std::string& cipher,
96 out->cipher_suite = cipher;
    [all...]
  /external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/mod_pywebsocket/
standalone.py 576 # Print cipher in use. Handshake is done on accept.
577 self._logger.debug('Cipher: %s', accepted_socket.cipher())
581 # We cannot print the cipher in use. pyOpenSSL doesn't provide
    [all...]
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
org.eclipse.equinox.security_1.0.200.v20100503.jar 
  /cts/suite/cts/deviceTests/browserbench/assets/octane/
pdfjs.js     [all...]
  /external/chromium_org/net/url_request/
url_request_unittest.cc 256 // The cipher suite TLS_NULL_WITH_NULL_NULL (0) must not be negotiated.
7032 const char* cipher; local
    [all...]

Completed in 1815 milliseconds

1 2 3 4 5 6 7 89