Searched defs:cipher (Results 151 - 175 of 193) sorted by relevance

12345678

/external/openssl/include/openssl/
H A Dcms.h161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher,
178 const EVP_CIPHER *cipher, unsigned int flags); variable
193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
H A Dpem.h146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon28390
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
H A Dpkcs7.h139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
339 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
366 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
H A Dx509.h505 EVP_CIPHER_INFO cipher; member in struct:private_key_st
1166 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
1168 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
/external/openssl/ssl/
H A Dssltest.c113 * ECC cipher suite support in OpenSSL originally developed by
298 static char *cipher=NULL; variable
360 fprintf(stderr," -cipher arg - The cipher list\n");
371 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n");
381 BIO_printf(bio_stdout,"%s%s, cipher %s %s",
557 cipher = 0;
713 else if (strcmp(*argv,"-cipher") == 0)
716 cipher= *(++argv);
792 /* ensure that the cipher lis
[all...]
H A Dssl_lib.c115 * ECC cipher suite support in OpenSSL originally developed by
207 * the old cipher. It is sort of a SSL_clear_lite :-) */
1332 * was unable to find a cipher matching the given rule string
1333 * (for example if the rule string specifies a cipher which
1896 /* ret->cipher=NULL;*/
2187 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) argument
2204 kl=SSL_C_EXPORT_PKEYLENGTH(cipher);
2314 * ECDSA cipher suites depending on the key usage extension.
2541 EVP_PKEY *ssl_get_sign_pkey(SSL *s,const SSL_CIPHER *cipher, const EVP_MD **pmd) argument
2546 alg_a = cipher
[all...]
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_atheros.c287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
293 printf("Unable to set group key cipher to %u\n", v);
474 u_int8_t cipher; local
485 cipher = IEEE80211_CIPHER_WEP;
488 cipher = IEEE80211_CIPHER_TKIP;
491 cipher = IEEE80211_CIPHER_AES_CCM;
495 cipher = IEEE80211_CIPHER_AES_CCM_256;
498 cipher = IEEE80211_CIPHER_AES_GCM;
501 cipher
[all...]
H A Ddriver_wext.c1938 int wpa_driver_wext_cipher2wext(int cipher) argument
1940 switch (cipher) {
2057 /* TODO: should consider getting wpa version and cipher/key_mgmt suites
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dtdls.c106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer
193 switch (peer->cipher) {
203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
686 peer->cipher = 0;
1063 * Regardless of the cipher used on the AP connection, select CCMP
1419 * RSN IE is filled only with CCMP cipher suite.
1422 * Regardless of the cipher used on the AP connection, select CCMP
1739 int cipher; local
1918 cipher
2121 int cipher; local
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_common.h216 tls_cipher cipher; member in struct:tls_cipher_suite
226 tls_cipher cipher; member in struct:tls_cipher_data
249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
250 int tls_server_key_exchange_allowed(tls_cipher cipher);
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_atheros.c287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
293 printf("Unable to set group key cipher to %u\n", v);
474 u_int8_t cipher; local
485 cipher = IEEE80211_CIPHER_WEP;
488 cipher = IEEE80211_CIPHER_TKIP;
491 cipher = IEEE80211_CIPHER_AES_CCM;
495 cipher = IEEE80211_CIPHER_AES_CCM_256;
498 cipher = IEEE80211_CIPHER_AES_GCM;
501 cipher
[all...]
H A Ddriver_wext.c1938 int wpa_driver_wext_cipher2wext(int cipher) argument
1940 switch (cipher) {
2057 /* TODO: should consider getting wpa version and cipher/key_mgmt suites
/external/wpa_supplicant_8/src/rsn_supp/
H A Dtdls.c106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer
193 switch (peer->cipher) {
203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
686 peer->cipher = 0;
1063 * Regardless of the cipher used on the AP connection, select CCMP
1419 * RSN IE is filled only with CCMP cipher suite.
1422 * Regardless of the cipher used on the AP connection, select CCMP
1739 int cipher; local
1918 cipher
2121 int cipher; local
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_common.h216 tls_cipher cipher; member in struct:tls_cipher_suite
226 tls_cipher cipher; member in struct:tls_cipher_data
249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
250 int tls_server_key_exchange_allowed(tls_cipher cipher);
/external/wpa_supplicant_8/wpa_supplicant/
H A Dconfig.c694 wpa_printf(MSG_ERROR, "Line %d: invalid cipher '%s'.",
699 wpa_printf(MSG_ERROR, "Line %d: no cipher values configured.",
708 static char * wpa_config_write_cipher(int cipher) argument
714 if (wpa_write_ciphers(buf, buf + 50, cipher, " ") < 0) {
733 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher "
762 wpa_printf(MSG_ERROR, "Line %d: not allowed group cipher "
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_atheros.c287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
293 printf("Unable to set group key cipher to %u\n", v);
474 u_int8_t cipher; local
485 cipher = IEEE80211_CIPHER_WEP;
488 cipher = IEEE80211_CIPHER_TKIP;
491 cipher = IEEE80211_CIPHER_AES_CCM;
495 cipher = IEEE80211_CIPHER_AES_CCM_256;
498 cipher = IEEE80211_CIPHER_AES_GCM;
501 cipher
[all...]
H A Ddriver_wext.c1938 int wpa_driver_wext_cipher2wext(int cipher) argument
1940 switch (cipher) {
2057 /* TODO: should consider getting wpa version and cipher/key_mgmt suites
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dtdls.c106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer
193 switch (peer->cipher) {
203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
686 peer->cipher = 0;
1063 * Regardless of the cipher used on the AP connection, select CCMP
1419 * RSN IE is filled only with CCMP cipher suite.
1422 * Regardless of the cipher used on the AP connection, select CCMP
1739 int cipher; local
1918 cipher
2121 int cipher; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_common.h216 tls_cipher cipher; member in struct:tls_cipher_suite
226 tls_cipher cipher; member in struct:tls_cipher_data
249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
250 int tls_server_key_exchange_allowed(tls_cipher cipher);
/external/chromium_org/third_party/boringssl/src/ssl/
H A Dssl_lib.c112 * ECC cipher suite support in OpenSSL originally developed by
203 * the old cipher. It is sort of a SSL_clear_lite :-) */
1187 * cipher suite value. */
1406 * was unable to find a cipher matching the given rule string
1407 * (for example if the rule string specifies a cipher which
2180 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) argument
2221 /* An ECC certificate may be usable for ECDSA cipher suites depending on
2323 EVP_PKEY *ssl_get_sign_pkey(SSL *s,const SSL_CIPHER *cipher, const EVP_MD **pmd) argument
2329 alg_a = cipher->algorithm_auth;
2554 /* clear the current cipher */
[all...]
/external/openssl/crypto/x509/
H A Dx509.h505 EVP_CIPHER_INFO cipher; member in struct:private_key_st
1166 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
1168 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_openssl.c2851 "cipher selection: %d", *c);
2862 wpa_printf(MSG_DEBUG, "OpenSSL: cipher suites: %s", buf + 1);
3364 conn->ssl->enc_read_ctx->cipher == NULL ||
3368 c = conn->ssl->enc_read_ctx->cipher;
3406 const SSL_CIPHER **cipher, void *arg)
3410 SSL_CIPHER **cipher, void *arg)
3404 tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg) argument
/external/wpa_supplicant_8/src/crypto/
H A Dtls_openssl.c2851 "cipher selection: %d", *c);
2862 wpa_printf(MSG_DEBUG, "OpenSSL: cipher suites: %s", buf + 1);
3364 conn->ssl->enc_read_ctx->cipher == NULL ||
3368 c = conn->ssl->enc_read_ctx->cipher;
3406 const SSL_CIPHER **cipher, void *arg)
3410 SSL_CIPHER **cipher, void *arg)
3404 tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg) argument
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_openssl.c2851 "cipher selection: %d", *c);
2862 wpa_printf(MSG_DEBUG, "OpenSSL: cipher suites: %s", buf + 1);
3364 conn->ssl->enc_read_ctx->cipher == NULL ||
3368 c = conn->ssl->enc_read_ctx->cipher;
3406 const SSL_CIPHER **cipher, void *arg)
3410 SSL_CIPHER **cipher, void *arg)
3404 tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg) argument
/external/chromium_org/net/url_request/
H A Durl_request_unittest.cc256 // The cipher suite TLS_NULL_WITH_NULL_NULL (0) must not be negotiated.
7032 const char* cipher; local
7035 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, cipher_suite);
7058 test_server.GetURL("client-cipher-list"), DEFAULT_PRIORITY, &d, NULL));

Completed in 426 milliseconds

12345678