Searched defs:cipher (Results 126 - 150 of 193) sorted by relevance

12345678

/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_madwifi.c253 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
257 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
259 printf("Unable to set group key cipher to %u\n", v);
423 u_int8_t cipher; local
433 cipher = IEEE80211_CIPHER_WEP;
435 cipher = IEEE80211_CIPHER_TKIP;
437 cipher = IEEE80211_CIPHER_AES_CCM;
451 wk.ik_type = cipher;
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_fast.c1447 "provisioning TLS cipher suites");
1453 "provisioning TLS cipher suites");
1464 "cipher suites for provisioning");
1572 char cipher[80]; local
1579 cipher, sizeof(cipher)) < 0 ||
1580 os_strstr(cipher, "ADH-") ||
1581 os_strstr(cipher, "anon"))) {
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_fast.c440 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher "
547 char cipher[64]; local
551 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher))
553 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher "
558 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
/external/wpa_supplicant_8/src/common/
H A Dwpa_common.c406 static int wpa_cipher_valid_group(int cipher) argument
408 return wpa_cipher_valid_pairwise(cipher) ||
409 cipher == WPA_CIPHER_WEP104 ||
410 cipher == WPA_CIPHER_WEP40 ||
411 cipher == WPA_CIPHER_GTK_NOT_USED;
416 int wpa_cipher_valid_mgmt_group(int cipher) argument
418 return cipher == WPA_CIPHER_AES_128_CMAC ||
419 cipher == WPA_CIPHER_BIP_GMAC_128 ||
420 cipher == WPA_CIPHER_BIP_GMAC_256 ||
421 cipher
936 wpa_cipher_txt(int cipher) argument
1146 wpa_cipher_key_len(int cipher) argument
1171 wpa_cipher_rsc_len(int cipher) argument
1189 wpa_cipher_to_alg(int cipher) argument
1218 wpa_cipher_valid_pairwise(int cipher) argument
1228 wpa_cipher_to_suite(int proto, int cipher) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_openssl.c365 const EVP_CIPHER *cipher; local
374 cipher = EVP_rc4();
381 cipher = EVP_aes_128_cbc();
385 cipher = EVP_aes_192_cbc();
389 cipher = EVP_aes_256_cbc();
399 cipher = EVP_des_ede3_cbc();
402 cipher = EVP_des_cbc();
407 cipher = EVP_rc2_ecb();
417 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) ||
427 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NUL
[all...]
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_madwifi.c253 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
257 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
259 printf("Unable to set group key cipher to %u\n", v);
423 u_int8_t cipher; local
433 cipher = IEEE80211_CIPHER_WEP;
435 cipher = IEEE80211_CIPHER_TKIP;
437 cipher = IEEE80211_CIPHER_AES_CCM;
451 wk.ik_type = cipher;
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_fast.c1447 "provisioning TLS cipher suites");
1453 "provisioning TLS cipher suites");
1464 "cipher suites for provisioning");
1572 char cipher[80]; local
1579 cipher, sizeof(cipher)) < 0 ||
1580 os_strstr(cipher, "ADH-") ||
1581 os_strstr(cipher, "anon"))) {
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_fast.c440 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher "
547 char cipher[64]; local
551 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher))
553 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher "
558 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
/external/wpa_supplicant_8/wpa_supplicant/
H A Dap.c269 int cipher = WPA_CIPHER_NONE; local
273 cipher = bss->default_wep_key_len >= 13 ?
275 bss->wpa_group = cipher;
276 bss->wpa_pairwise = cipher;
277 bss->rsn_pairwise = cipher;
279 int cipher = WPA_CIPHER_WEP40; local
281 cipher = WPA_CIPHER_WEP104;
283 bss->wpa_group = cipher;
284 bss->wpa_pairwise = cipher;
285 bss->rsn_pairwise = cipher;
[all...]
H A Dwpas_glue.c218 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local
221 wpa_s->pairwise_cipher = cipher;
223 wpa_s->group_cipher = cipher;
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_common.c406 static int wpa_cipher_valid_group(int cipher) argument
408 return wpa_cipher_valid_pairwise(cipher) ||
409 cipher == WPA_CIPHER_WEP104 ||
410 cipher == WPA_CIPHER_WEP40 ||
411 cipher == WPA_CIPHER_GTK_NOT_USED;
416 int wpa_cipher_valid_mgmt_group(int cipher) argument
418 return cipher == WPA_CIPHER_AES_128_CMAC ||
419 cipher == WPA_CIPHER_BIP_GMAC_128 ||
420 cipher == WPA_CIPHER_BIP_GMAC_256 ||
421 cipher
936 wpa_cipher_txt(int cipher) argument
1146 wpa_cipher_key_len(int cipher) argument
1171 wpa_cipher_rsc_len(int cipher) argument
1189 wpa_cipher_to_alg(int cipher) argument
1218 wpa_cipher_valid_pairwise(int cipher) argument
1228 wpa_cipher_to_suite(int proto, int cipher) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_openssl.c365 const EVP_CIPHER *cipher; local
374 cipher = EVP_rc4();
381 cipher = EVP_aes_128_cbc();
385 cipher = EVP_aes_192_cbc();
389 cipher = EVP_aes_256_cbc();
399 cipher = EVP_des_ede3_cbc();
402 cipher = EVP_des_cbc();
407 cipher = EVP_rc2_ecb();
417 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) ||
427 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NUL
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_madwifi.c253 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
257 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
259 printf("Unable to set group key cipher to %u\n", v);
423 u_int8_t cipher; local
433 cipher = IEEE80211_CIPHER_WEP;
435 cipher = IEEE80211_CIPHER_TKIP;
437 cipher = IEEE80211_CIPHER_AES_CCM;
451 wk.ik_type = cipher;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_fast.c1447 "provisioning TLS cipher suites");
1453 "provisioning TLS cipher suites");
1464 "cipher suites for provisioning");
1572 char cipher[80]; local
1579 cipher, sizeof(cipher)) < 0 ||
1580 os_strstr(cipher, "ADH-") ||
1581 os_strstr(cipher, "anon"))) {
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_fast.c440 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher "
547 char cipher[64]; local
551 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher))
553 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher "
558 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
/external/chromium_org/net/third_party/nss/ssl/
H A Dssl3ext.c1100 + 10 /* cipher spec parameters */
1148 /* cipher spec parameters */
1582 /* Read cipher spec parameters. */
2033 /* Length of the SRTP cipher list */
2062 /* Length of the SRTP cipher list */
2065 /* The selected cipher */
2082 PRUint16 cipher = 0; local
2093 /* Get the cipher list */
2104 /* Get the selected cipher */
2105 cipher
[all...]
H A Dsslcon.c61 PRUint8 keyLen; /* cipher symkey size in bytes. */
118 * lsb corresponds to first cipher suite in allCipherSuites[].
141 /* Construct a socket's list of cipher specs from the global default values.
173 /* ask SSL3 how many cipher suites it has. */
179 /* Allocate memory to hold cipher specs */
193 /* fill in cipher specs for SSL2 cipher suites */
218 ** (e.g. SSL2 or SSL3) is logically enabled, but all its cipher suites
221 ** if no cipher suites are found, it sets the error code and returns
649 ssl2_SendSessionKeyMessage(sslSocket *ss, int cipher, in argument
1263 ssl2_FillInSID(sslSessionID * sid, int cipher, PRUint8 *keyData, int keyLen, PRUint8 *ca, int caLen, int keyBits, int secretKeyBits, SSLSignType authAlgorithm, PRUint32 authKeyBits, SSLKEAType keaType, PRUint32 keaKeyBits) argument
1545 ssl2_ServerSetupSessionCypher(sslSocket *ss, int cipher, unsigned int keyBits, PRUint8 *ck, unsigned int ckLen, PRUint8 *ek, unsigned int ekLen, PRUint8 *ca, unsigned int caLen) argument
2021 int cipher; local
3223 int cipher; local
[all...]
H A Dsslsock.c1135 /* function tells us if the cipher suite is one that we no longer support. */
1337 const PRUint16 *cipher; local
1339 for (cipher = SSL_ImplementedCiphers; *cipher != 0; ++cipher) {
1340 status = SSL_SetPolicy(*cipher, SSL_ALLOWED);
1606 SSL_DBG(("%d: SSL[%d]: invalid or unimplemented SRTP cipher "
1621 SSL_GetSRTPCipher(PRFileDesc *fd, PRUint16 *cipher) argument
1638 *cipher = ss->ssl3.dtlsSRTPCipherSuite;
/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Dpem.h62 #include <openssl/cipher.h>
143 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
157 int cipher; member in struct:pem_recip_st
174 int cipher; member in struct:pem_ctx_st::__anon11669
190 EVP_CIPHER *dec; /* date encryption cipher */
401 OPENSSL_EXPORT int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
402 OPENSSL_EXPORT int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len, pem_password_cb *callback,void *u);
/external/chromium_org/third_party/libjingle/source/talk/session/media/
H A Dmediasession.cc87 static bool CreateCryptoParams(int tag, const std::string& cipher, argument
96 out->cipher_suite = cipher;
/external/openssl/apps/
H A Ds_client.c344 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n");
345 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n");
584 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local
917 else if (strcmp(*argv,"-cipher") == 0)
920 cipher= *(++argv);
1019 if (cipher)
1021 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
1024 cipher = "PSK";
1210 if (cipher !
[all...]
H A Ds_server.c113 * ECC cipher suite support in OpenSSL originally developed by
267 static char *cipher=NULL; variable
429 cipher=NULL;
502 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n");
503 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n");
1121 else if (strcmp(*argv,"-cipher") == 0)
1124 cipher= *(++argv);
1384 if (cipher)
1386 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
1389 cipher
[all...]
/external/openssl/crypto/cms/
H A Dcms.h161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher,
178 const EVP_CIPHER *cipher, unsigned int flags); variable
193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
/external/openssl/crypto/pem/
H A Dpem.h146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon28347
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
/external/openssl/crypto/pkcs7/
H A Dpkcs7.h139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
339 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
366 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable

Completed in 449 milliseconds

12345678