/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_madwifi.c | 253 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 257 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 259 printf("Unable to set group key cipher to %u\n", v); 423 u_int8_t cipher; local 433 cipher = IEEE80211_CIPHER_WEP; 435 cipher = IEEE80211_CIPHER_TKIP; 437 cipher = IEEE80211_CIPHER_AES_CCM; 451 wk.ik_type = cipher;
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast.c | 1447 "provisioning TLS cipher suites"); 1453 "provisioning TLS cipher suites"); 1464 "cipher suites for provisioning"); 1572 char cipher[80]; local 1579 cipher, sizeof(cipher)) < 0 || 1580 os_strstr(cipher, "ADH-") || 1581 os_strstr(cipher, "anon"))) {
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_fast.c | 440 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher " 547 char cipher[64]; local 551 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 553 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher " 558 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 406 static int wpa_cipher_valid_group(int cipher) argument 408 return wpa_cipher_valid_pairwise(cipher) || 409 cipher == WPA_CIPHER_WEP104 || 410 cipher == WPA_CIPHER_WEP40 || 411 cipher == WPA_CIPHER_GTK_NOT_USED; 416 int wpa_cipher_valid_mgmt_group(int cipher) argument 418 return cipher == WPA_CIPHER_AES_128_CMAC || 419 cipher == WPA_CIPHER_BIP_GMAC_128 || 420 cipher == WPA_CIPHER_BIP_GMAC_256 || 421 cipher 936 wpa_cipher_txt(int cipher) argument 1146 wpa_cipher_key_len(int cipher) argument 1171 wpa_cipher_rsc_len(int cipher) argument 1189 wpa_cipher_to_alg(int cipher) argument 1218 wpa_cipher_valid_pairwise(int cipher) argument 1228 wpa_cipher_to_suite(int proto, int cipher) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_openssl.c | 365 const EVP_CIPHER *cipher; local 374 cipher = EVP_rc4(); 381 cipher = EVP_aes_128_cbc(); 385 cipher = EVP_aes_192_cbc(); 389 cipher = EVP_aes_256_cbc(); 399 cipher = EVP_des_ede3_cbc(); 402 cipher = EVP_des_cbc(); 407 cipher = EVP_rc2_ecb(); 417 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) || 427 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NUL [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_madwifi.c | 253 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 257 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 259 printf("Unable to set group key cipher to %u\n", v); 423 u_int8_t cipher; local 433 cipher = IEEE80211_CIPHER_WEP; 435 cipher = IEEE80211_CIPHER_TKIP; 437 cipher = IEEE80211_CIPHER_AES_CCM; 451 wk.ik_type = cipher;
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_fast.c | 1447 "provisioning TLS cipher suites"); 1453 "provisioning TLS cipher suites"); 1464 "cipher suites for provisioning"); 1572 char cipher[80]; local 1579 cipher, sizeof(cipher)) < 0 || 1580 os_strstr(cipher, "ADH-") || 1581 os_strstr(cipher, "anon"))) {
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_fast.c | 440 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher " 547 char cipher[64]; local 551 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 553 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher " 558 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ap.c | 269 int cipher = WPA_CIPHER_NONE; local 273 cipher = bss->default_wep_key_len >= 13 ? 275 bss->wpa_group = cipher; 276 bss->wpa_pairwise = cipher; 277 bss->rsn_pairwise = cipher; 279 int cipher = WPA_CIPHER_WEP40; local 281 cipher = WPA_CIPHER_WEP104; 283 bss->wpa_group = cipher; 284 bss->wpa_pairwise = cipher; 285 bss->rsn_pairwise = cipher; [all...] |
H A D | wpas_glue.c | 218 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local 221 wpa_s->pairwise_cipher = cipher; 223 wpa_s->group_cipher = cipher;
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 406 static int wpa_cipher_valid_group(int cipher) argument 408 return wpa_cipher_valid_pairwise(cipher) || 409 cipher == WPA_CIPHER_WEP104 || 410 cipher == WPA_CIPHER_WEP40 || 411 cipher == WPA_CIPHER_GTK_NOT_USED; 416 int wpa_cipher_valid_mgmt_group(int cipher) argument 418 return cipher == WPA_CIPHER_AES_128_CMAC || 419 cipher == WPA_CIPHER_BIP_GMAC_128 || 420 cipher == WPA_CIPHER_BIP_GMAC_256 || 421 cipher 936 wpa_cipher_txt(int cipher) argument 1146 wpa_cipher_key_len(int cipher) argument 1171 wpa_cipher_rsc_len(int cipher) argument 1189 wpa_cipher_to_alg(int cipher) argument 1218 wpa_cipher_valid_pairwise(int cipher) argument 1228 wpa_cipher_to_suite(int proto, int cipher) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_openssl.c | 365 const EVP_CIPHER *cipher; local 374 cipher = EVP_rc4(); 381 cipher = EVP_aes_128_cbc(); 385 cipher = EVP_aes_192_cbc(); 389 cipher = EVP_aes_256_cbc(); 399 cipher = EVP_des_ede3_cbc(); 402 cipher = EVP_des_cbc(); 407 cipher = EVP_rc2_ecb(); 417 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) || 427 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NUL [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_madwifi.c | 253 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 257 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 259 printf("Unable to set group key cipher to %u\n", v); 423 u_int8_t cipher; local 433 cipher = IEEE80211_CIPHER_WEP; 435 cipher = IEEE80211_CIPHER_TKIP; 437 cipher = IEEE80211_CIPHER_AES_CCM; 451 wk.ik_type = cipher;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast.c | 1447 "provisioning TLS cipher suites"); 1453 "provisioning TLS cipher suites"); 1464 "cipher suites for provisioning"); 1572 char cipher[80]; local 1579 cipher, sizeof(cipher)) < 0 || 1580 os_strstr(cipher, "ADH-") || 1581 os_strstr(cipher, "anon"))) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_fast.c | 440 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher " 547 char cipher[64]; local 551 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 553 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher " 558 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | ssl3ext.c | 1100 + 10 /* cipher spec parameters */ 1148 /* cipher spec parameters */ 1582 /* Read cipher spec parameters. */ 2033 /* Length of the SRTP cipher list */ 2062 /* Length of the SRTP cipher list */ 2065 /* The selected cipher */ 2082 PRUint16 cipher = 0; local 2093 /* Get the cipher list */ 2104 /* Get the selected cipher */ 2105 cipher [all...] |
H A D | sslcon.c | 61 PRUint8 keyLen; /* cipher symkey size in bytes. */ 118 * lsb corresponds to first cipher suite in allCipherSuites[]. 141 /* Construct a socket's list of cipher specs from the global default values. 173 /* ask SSL3 how many cipher suites it has. */ 179 /* Allocate memory to hold cipher specs */ 193 /* fill in cipher specs for SSL2 cipher suites */ 218 ** (e.g. SSL2 or SSL3) is logically enabled, but all its cipher suites 221 ** if no cipher suites are found, it sets the error code and returns 649 ssl2_SendSessionKeyMessage(sslSocket *ss, int cipher, in argument 1263 ssl2_FillInSID(sslSessionID * sid, int cipher, PRUint8 *keyData, int keyLen, PRUint8 *ca, int caLen, int keyBits, int secretKeyBits, SSLSignType authAlgorithm, PRUint32 authKeyBits, SSLKEAType keaType, PRUint32 keaKeyBits) argument 1545 ssl2_ServerSetupSessionCypher(sslSocket *ss, int cipher, unsigned int keyBits, PRUint8 *ck, unsigned int ckLen, PRUint8 *ek, unsigned int ekLen, PRUint8 *ca, unsigned int caLen) argument 2021 int cipher; local 3223 int cipher; local [all...] |
H A D | sslsock.c | 1135 /* function tells us if the cipher suite is one that we no longer support. */ 1337 const PRUint16 *cipher; local 1339 for (cipher = SSL_ImplementedCiphers; *cipher != 0; ++cipher) { 1340 status = SSL_SetPolicy(*cipher, SSL_ALLOWED); 1606 SSL_DBG(("%d: SSL[%d]: invalid or unimplemented SRTP cipher " 1621 SSL_GetSRTPCipher(PRFileDesc *fd, PRUint16 *cipher) argument 1638 *cipher = ss->ssl3.dtlsSRTPCipherSuite;
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | pem.h | 62 #include <openssl/cipher.h> 143 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 157 int cipher; member in struct:pem_recip_st 174 int cipher; member in struct:pem_ctx_st::__anon11669 190 EVP_CIPHER *dec; /* date encryption cipher */ 401 OPENSSL_EXPORT int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 402 OPENSSL_EXPORT int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len, pem_password_cb *callback,void *u);
|
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
H A D | mediasession.cc | 87 static bool CreateCryptoParams(int tag, const std::string& cipher, argument 96 out->cipher_suite = cipher;
|
/external/openssl/apps/ |
H A D | s_client.c | 344 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n"); 345 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n"); 584 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local 917 else if (strcmp(*argv,"-cipher") == 0) 920 cipher= *(++argv); 1019 if (cipher) 1021 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n"); 1024 cipher = "PSK"; 1210 if (cipher ! [all...] |
H A D | s_server.c | 113 * ECC cipher suite support in OpenSSL originally developed by 267 static char *cipher=NULL; variable 429 cipher=NULL; 502 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n"); 503 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n"); 1121 else if (strcmp(*argv,"-cipher") == 0) 1124 cipher= *(++argv); 1384 if (cipher) 1386 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n"); 1389 cipher [all...] |
/external/openssl/crypto/cms/ |
H A D | cms.h | 161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, 178 const EVP_CIPHER *cipher, unsigned int flags); variable 193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
|
/external/openssl/crypto/pem/ |
H A D | pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon28347 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
/external/openssl/crypto/pkcs7/ |
H A D | pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 339 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 366 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|