/external/openssl/include/openssl/ |
H A D | cms.h | 161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, 178 const EVP_CIPHER *cipher, unsigned int flags); variable 193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
|
H A D | pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon28390 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
H A D | pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 339 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 366 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
H A D | x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st 1166 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 1168 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
|
/external/openssl/ssl/ |
H A D | ssltest.c | 113 * ECC cipher suite support in OpenSSL originally developed by 298 static char *cipher=NULL; variable 360 fprintf(stderr," -cipher arg - The cipher list\n"); 371 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n"); 381 BIO_printf(bio_stdout,"%s%s, cipher %s %s", 557 cipher = 0; 713 else if (strcmp(*argv,"-cipher") == 0) 716 cipher= *(++argv); 792 /* ensure that the cipher lis [all...] |
H A D | ssl_lib.c | 115 * ECC cipher suite support in OpenSSL originally developed by 207 * the old cipher. It is sort of a SSL_clear_lite :-) */ 1332 * was unable to find a cipher matching the given rule string 1333 * (for example if the rule string specifies a cipher which 1896 /* ret->cipher=NULL;*/ 2187 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) argument 2204 kl=SSL_C_EXPORT_PKEYLENGTH(cipher); 2314 * ECDSA cipher suites depending on the key usage extension. 2541 EVP_PKEY *ssl_get_sign_pkey(SSL *s,const SSL_CIPHER *cipher, const EVP_MD **pmd) argument 2546 alg_a = cipher [all...] |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_atheros.c | 287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 293 printf("Unable to set group key cipher to %u\n", v); 474 u_int8_t cipher; local 485 cipher = IEEE80211_CIPHER_WEP; 488 cipher = IEEE80211_CIPHER_TKIP; 491 cipher = IEEE80211_CIPHER_AES_CCM; 495 cipher = IEEE80211_CIPHER_AES_CCM_256; 498 cipher = IEEE80211_CIPHER_AES_GCM; 501 cipher [all...] |
H A D | driver_wext.c | 1938 int wpa_driver_wext_cipher2wext(int cipher) argument 1940 switch (cipher) { 2057 /* TODO: should consider getting wpa version and cipher/key_mgmt suites
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | tdls.c | 106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer 193 switch (peer->cipher) { 203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", 686 peer->cipher = 0; 1063 * Regardless of the cipher used on the AP connection, select CCMP 1419 * RSN IE is filled only with CCMP cipher suite. 1422 * Regardless of the cipher used on the AP connection, select CCMP 1739 int cipher; local 1918 cipher 2121 int cipher; local [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_common.h | 216 tls_cipher cipher; member in struct:tls_cipher_suite 226 tls_cipher cipher; member in struct:tls_cipher_data 249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher); 250 int tls_server_key_exchange_allowed(tls_cipher cipher);
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_atheros.c | 287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 293 printf("Unable to set group key cipher to %u\n", v); 474 u_int8_t cipher; local 485 cipher = IEEE80211_CIPHER_WEP; 488 cipher = IEEE80211_CIPHER_TKIP; 491 cipher = IEEE80211_CIPHER_AES_CCM; 495 cipher = IEEE80211_CIPHER_AES_CCM_256; 498 cipher = IEEE80211_CIPHER_AES_GCM; 501 cipher [all...] |
H A D | driver_wext.c | 1938 int wpa_driver_wext_cipher2wext(int cipher) argument 1940 switch (cipher) { 2057 /* TODO: should consider getting wpa version and cipher/key_mgmt suites
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | tdls.c | 106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer 193 switch (peer->cipher) { 203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", 686 peer->cipher = 0; 1063 * Regardless of the cipher used on the AP connection, select CCMP 1419 * RSN IE is filled only with CCMP cipher suite. 1422 * Regardless of the cipher used on the AP connection, select CCMP 1739 int cipher; local 1918 cipher 2121 int cipher; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_common.h | 216 tls_cipher cipher; member in struct:tls_cipher_suite 226 tls_cipher cipher; member in struct:tls_cipher_data 249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher); 250 int tls_server_key_exchange_allowed(tls_cipher cipher);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | config.c | 694 wpa_printf(MSG_ERROR, "Line %d: invalid cipher '%s'.", 699 wpa_printf(MSG_ERROR, "Line %d: no cipher values configured.", 708 static char * wpa_config_write_cipher(int cipher) argument 714 if (wpa_write_ciphers(buf, buf + 50, cipher, " ") < 0) { 733 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher " 762 wpa_printf(MSG_ERROR, "Line %d: not allowed group cipher "
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_atheros.c | 287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 293 printf("Unable to set group key cipher to %u\n", v); 474 u_int8_t cipher; local 485 cipher = IEEE80211_CIPHER_WEP; 488 cipher = IEEE80211_CIPHER_TKIP; 491 cipher = IEEE80211_CIPHER_AES_CCM; 495 cipher = IEEE80211_CIPHER_AES_CCM_256; 498 cipher = IEEE80211_CIPHER_AES_GCM; 501 cipher [all...] |
H A D | driver_wext.c | 1938 int wpa_driver_wext_cipher2wext(int cipher) argument 1940 switch (cipher) { 2057 /* TODO: should consider getting wpa version and cipher/key_mgmt suites
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | tdls.c | 106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer 193 switch (peer->cipher) { 203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", 686 peer->cipher = 0; 1063 * Regardless of the cipher used on the AP connection, select CCMP 1419 * RSN IE is filled only with CCMP cipher suite. 1422 * Regardless of the cipher used on the AP connection, select CCMP 1739 int cipher; local 1918 cipher 2121 int cipher; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.h | 216 tls_cipher cipher; member in struct:tls_cipher_suite 226 tls_cipher cipher; member in struct:tls_cipher_data 249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher); 250 int tls_server_key_exchange_allowed(tls_cipher cipher);
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_lib.c | 112 * ECC cipher suite support in OpenSSL originally developed by 203 * the old cipher. It is sort of a SSL_clear_lite :-) */ 1187 * cipher suite value. */ 1406 * was unable to find a cipher matching the given rule string 1407 * (for example if the rule string specifies a cipher which 2180 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) argument 2221 /* An ECC certificate may be usable for ECDSA cipher suites depending on 2323 EVP_PKEY *ssl_get_sign_pkey(SSL *s,const SSL_CIPHER *cipher, const EVP_MD **pmd) argument 2329 alg_a = cipher->algorithm_auth; 2554 /* clear the current cipher */ [all...] |
/external/openssl/crypto/x509/ |
H A D | x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st 1166 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 1168 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 2851 "cipher selection: %d", *c); 2862 wpa_printf(MSG_DEBUG, "OpenSSL: cipher suites: %s", buf + 1); 3364 conn->ssl->enc_read_ctx->cipher == NULL || 3368 c = conn->ssl->enc_read_ctx->cipher; 3406 const SSL_CIPHER **cipher, void *arg) 3410 SSL_CIPHER **cipher, void *arg) 3404 tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 2851 "cipher selection: %d", *c); 2862 wpa_printf(MSG_DEBUG, "OpenSSL: cipher suites: %s", buf + 1); 3364 conn->ssl->enc_read_ctx->cipher == NULL || 3368 c = conn->ssl->enc_read_ctx->cipher; 3406 const SSL_CIPHER **cipher, void *arg) 3410 SSL_CIPHER **cipher, void *arg) 3404 tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 2851 "cipher selection: %d", *c); 2862 wpa_printf(MSG_DEBUG, "OpenSSL: cipher suites: %s", buf + 1); 3364 conn->ssl->enc_read_ctx->cipher == NULL || 3368 c = conn->ssl->enc_read_ctx->cipher; 3406 const SSL_CIPHER **cipher, void *arg) 3410 SSL_CIPHER **cipher, void *arg) 3404 tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg) argument
|
/external/chromium_org/net/url_request/ |
H A D | url_request_unittest.cc | 256 // The cipher suite TLS_NULL_WITH_NULL_NULL (0) must not be negotiated. 7032 const char* cipher; local 7035 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, cipher_suite); 7058 test_server.GetURL("client-cipher-list"), DEFAULT_PRIORITY, &d, NULL));
|