/external/chromium_org/third_party/boringssl/src/ssl/ |
s3_srvr.c | 119 * ECC cipher suite support in OpenSSL originally written by 158 #include <openssl/cipher.h> 586 s->session->cipher=s->s3->tmp.new_cipher; 964 /* We need a cipher if we are not resuming a session. */ 975 /* If it is a hit, check that the cipher is in the list */ 979 unsigned long id = s->session->cipher->id; 992 /* we need to have the cipher in the cipher 1055 /* check if some cipher was preferred by call back */ 1064 s->session->cipher=pref_cipher [all...] |
ssl_lib.c | 112 * ECC cipher suite support in OpenSSL originally developed by 203 * the old cipher. It is sort of a SSL_clear_lite :-) */ 1187 * cipher suite value. */ [all...] |
s3_clnt.c | 120 * ECC cipher suite support in OpenSSL originally written by 402 s->session->cipher=s->s3->tmp.new_cipher; 870 s->session->cipher = pref_cipher ? 912 /* unknown cipher */ 923 /* If it is a disabled cipher we didn't send it in client hello, 938 /* we did not say we would use this cipher */ 944 /* Depending on the session caching (internal/external), the cipher 947 if (s->session->cipher) 948 s->session->cipher_id = s->session->cipher->id; [all...] |
d1_both.c | 295 blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher); [all...] |
ssl_sess.c | 840 STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg), void *arg)
|
d1_pkt.c | 708 * Change cipher spec protocol 952 (s->session != NULL) && (s->session->cipher != NULL)) [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
sslimpl.h | 286 ** SSL3 cipher suite policy and preference struct. 471 /* The SSL bulk cipher definition */ 490 cipher_missing /* reserved for no such supported cipher */ 561 * the cipher spec. Note that this is a ring buffer but left and 660 /* Stuff used to recreate key and read/write cipher objects */ 773 SSL3BulkCipher cipher; member in struct:ssl3BulkCipherDefStr [all...] |
ssl3con.c | 110 /* This list of SSL3 cipher suites is sorted in descending order of 111 * precedence (desirability). It only includes cipher suites we implement. 112 * This table is modified by SSL3_SetPolicy(). The ordering of cipher suites 115 * Important: See bug 946147 before enabling, reordering, or adding any cipher 181 /* 56-bit DES "domestic" cipher suites */ 215 * because it SSL_ImplementedCiphers includes SSL 2.0 cipher suites. 290 /* cipher calg k s type i b t n */ 394 /* New TLS cipher suites */ 656 /* See RFC 4346 A.5. Export cipher suites must not be used in TLS 1.1 or 657 * later. This set of cipher suites is similar to, but different from, th 1405 SSL3BulkCipher cipher; local [all...] |
/external/conscrypt/src/main/native/ |
org_conscrypt_NativeCrypto.cpp | 7777 SSL_CIPHER* cipher = to_SSL_CIPHER(env, ssl_cipher_address, true); local 7785 SSL_CIPHER* cipher = to_SSL_CIPHER(env, ssl_cipher_address, true); local 7827 const SSL_CIPHER* cipher = ssl_method->get_cipher(j); local 9490 const SSL_CIPHER* cipher = ssl_session->cipher; local [all...] |
/external/google-tv-pairing-protocol/java/jar/ |
bcprov-jdk15-143.jar | |
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
e_rc2.c | 57 #include <openssl/cipher.h>
|
/external/openssl/include/openssl/ |
ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 323 * to the default cipher setup will also be included here. 332 /* The following cipher list is used by default. 333 * It also is substituted when an application-defined cipher list string 383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); 433 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 449 * Cipher OCTET STRING, -- the 3 byte cipher ID 520 const SSL_CIPHER *cipher; member in struct:ssl_session_st 523 * the 'cipher' structure * [all...] |
/external/openssl/ssl/ |
ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 323 * to the default cipher setup will also be included here. 332 /* The following cipher list is used by default. 333 * It also is substituted when an application-defined cipher list string 383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); 433 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 449 * Cipher OCTET STRING, -- the 3 byte cipher ID 520 const SSL_CIPHER *cipher; member in struct:ssl_session_st 523 * the 'cipher' structure * [all...] |
d1_both.c | 286 (EVP_CIPHER_mode( s->enc_write_ctx->cipher) & EVP_CIPH_CBC_MODE)) 287 blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher); [all...] |
s3_srvr.c | 120 * ECC cipher suite support in OpenSSL originally written by 473 * message only if the cipher suite is either 779 s->session->cipher=s->s3->tmp.new_cipher; 1125 /* we need a cipher if we are not resuming a session */ 1144 /* If it is a hit, check that the cipher is in the list */ 1148 id=s->session->cipher->id; [all...] |
s3_clnt.c | 120 * ECC cipher suite support in OpenSSL originally written by 430 * authentication in ECDH cipher suites with 480 s->session->cipher=s->s3->tmp.new_cipher; 977 s->session->cipher = pref_cipher ? 1024 /* unknown cipher */ 1052 /* we did not say we would use this cipher */ 1058 /* Depending on the session caching (internal/external), the cipher 1061 if (s->session->cipher) 1062 s->session->cipher_id = s->session->cipher->id; [all...] |
ssl_locl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 282 * Use the according functions for cipher management instead. 345 /* Not a real MAC, just an indication it is part of cipher */ 386 * Export and cipher strength information. For each cipher we have to decide 390 * Independent of the export flag the cipher strength is sorted into classes. 392 * is at 56bit (SSL_EXP56). If the exportable cipher class is going to change 419 * Macros to check the export status and cipher strength for export ciphers. 423 * *_EXPORT40/56 macros are used to check whether a certain cipher strength 859 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher); [all...] |
d1_clnt.c | 544 s->session->cipher=s->s3->tmp.new_cipher; [all...] |
d1_srvr.c | 716 s->session->cipher=s->s3->tmp.new_cipher; 967 /* put the cipher */ [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 245 * to the default cipher setup will also be included here. 253 /* The following cipher list is used by default. 254 * It also is substituted when an application-defined cipher list string 302 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg); 366 * Cipher OCTET STRING, -- the 3 byte cipher ID 432 const SSL_CIPHER *cipher; member in struct:ssl_session_st 435 * the 'cipher' structure */ 754 * server picks the cipher and groups cannot be expressed on the wire. However [all...] |
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
mediasession.cc | 87 static bool CreateCryptoParams(int tag, const std::string& cipher, 96 out->cipher_suite = cipher; [all...] |
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/mod_pywebsocket/ |
standalone.py | 576 # Print cipher in use. Handshake is done on accept. 577 self._logger.debug('Cipher: %s', accepted_socket.cipher()) 581 # We cannot print the cipher in use. pyOpenSSL doesn't provide [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.equinox.security_1.0.200.v20100503.jar | |
/cts/suite/cts/deviceTests/browserbench/assets/octane/ |
pdfjs.js | [all...] |
/external/chromium_org/net/url_request/ |
url_request_unittest.cc | 256 // The cipher suite TLS_NULL_WITH_NULL_NULL (0) must not be negotiated. 7032 const char* cipher; local [all...] |