/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | x509.h | 73 #include <openssl/cipher.h> 459 EVP_CIPHER_INFO cipher; member in struct:private_key_st 1129 OPENSSL_EXPORT X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 1131 OPENSSL_EXPORT X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
|
H A D | ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 245 * to the default cipher setup will also be included here. 253 /* The following cipher list is used by default. 254 * It also is substituted when an application-defined cipher list string 302 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg); 366 * Cipher OCTET STRING, -- the 3 byte cipher ID 432 const SSL_CIPHER *cipher; member in struct:ssl_session_st 435 * the 'cipher' structure */ 754 * server picks the cipher and groups cannot be expressed on the wire. However, 798 * version number is known at connect time and so the cipher lis [all...] |
/external/openssl/crypto/evp/ |
H A D | evp.h | 322 /* Values for cipher flags */ 336 /* Set if variable length cipher */ 338 /* Set if the iv handling should be done by the cipher itself */ 340 /* Set if the cipher's init() function should be called if key is NULL */ 342 /* Call ctrl() to init cipher parameters */ 348 /* cipher handles random key generation */ 350 /* cipher has its own additional copying logic */ 358 /* Allow non FIPS cipher in FIPS mode */ 387 /* AEAD cipher deduces payload length and returns number of bytes 407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
/external/openssl/include/openssl/ |
H A D | evp.h | 322 /* Values for cipher flags */ 336 /* Set if variable length cipher */ 338 /* Set if the iv handling should be done by the cipher itself */ 340 /* Set if the cipher's init() function should be called if key is NULL */ 342 /* Call ctrl() to init cipher parameters */ 348 /* cipher handles random key generation */ 350 /* cipher has its own additional copying logic */ 358 /* Allow non FIPS cipher in FIPS mode */ 387 /* AEAD cipher deduces payload length and returns number of bytes 407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
H A D | ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 323 * to the default cipher setup will also be included here. 332 /* The following cipher list is used by default. 333 * It also is substituted when an application-defined cipher list string 383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); 433 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 449 * Cipher OCTET STRING, -- the 3 byte cipher ID 520 const SSL_CIPHER *cipher; member in struct:ssl_session_st 523 * the 'cipher' structure */ 613 /* Set on servers to choose the cipher accordin [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface.c | 2051 static char * wpa_supplicant_cipher_txt(char *pos, char *end, int cipher) argument 2058 ret = wpa_write_ciphers(pos, end, cipher, "+");
|
/external/google-tv-pairing-protocol/java/jar/ |
H A D | bcprov-jdk15-143.jar | META-INF/MANIFEST.MF META-INF/BCKEY.SF META-INF/BCKEY.DSA META ... |
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | ssl3con.c | 110 /* This list of SSL3 cipher suites is sorted in descending order of 111 * precedence (desirability). It only includes cipher suites we implement. 112 * This table is modified by SSL3_SetPolicy(). The ordering of cipher suites 115 * Important: See bug 946147 before enabling, reordering, or adding any cipher 181 /* 56-bit DES "domestic" cipher suites */ 215 * because it SSL_ImplementedCiphers includes SSL 2.0 cipher suites. 290 /* cipher calg k s type i b t n */ 394 /* New TLS cipher suites */ 656 /* See RFC 4346 A.5. Export cipher suites must not be used in TLS 1.1 or 657 * later. This set of cipher suite 1405 SSL3BulkCipher cipher; local [all...] |
H A D | sslimpl.h | 286 ** SSL3 cipher suite policy and preference struct. 471 /* The SSL bulk cipher definition */ 490 cipher_missing /* reserved for no such supported cipher */ 561 * the cipher spec. Note that this is a ring buffer but left and 660 /* Stuff used to recreate key and read/write cipher objects */ 773 SSL3BulkCipher cipher; member in struct:ssl3BulkCipherDefStr 1014 /* This says what cipher suites we can do, and should 1035 /* DTLS-SRTP cipher suite preferences (if any) */ 1330 PRUint16 chosenPreference; /* SSL2 cipher preferences. */ 1669 sslSocket *ss, SSL3Ciphertext *cipher, sslBuffe [all...] |
/external/conscrypt/src/main/native/ |
H A D | org_conscrypt_NativeCrypto.cpp | 4396 JNI_TRACE("EVP_CipherInit_ex => error initializing cipher"); 4512 jniThrowOutOfMemory(env, "Unable to allocate cipher context"); 6379 // Chain can be NULL if the associated cipher doesn't do certs. 6499 * wants to use an exportable RSA cipher suite. 6502 * wants to use an TLS_ECDHE_* cipher suite. 7170 * Call back to ask for an ephemeral EC key for TLS_ECDHE_* cipher suites 7777 SSL_CIPHER* cipher = to_SSL_CIPHER(env, ssl_cipher_address, true); local 7778 JNI_TRACE("cipher=%p get_SSL_CIPHER_algorithm_mkey => %ld", cipher, cipher 7785 SSL_CIPHER* cipher = to_SSL_CIPHER(env, ssl_cipher_address, true); local 7827 const SSL_CIPHER* cipher = ssl_method->get_cipher(j); local 9490 const SSL_CIPHER* cipher = ssl_session->cipher; local [all...] |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211.c | 3715 wpa_printf(MSG_DEBUG, "nl80211: Supported cipher %02x-%02x-%02x:%d", 5823 static u32 wpa_cipher_to_cipher_suite(unsigned int cipher) argument 5825 switch (cipher) { 8934 u32 cipher = wpa_cipher_to_cipher_suite(params->pairwise_suite); local 8935 wpa_printf(MSG_DEBUG, " * pairwise=0x%x", cipher); 8936 NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE, cipher); 8945 wpa_printf(MSG_DEBUG, " * skip group cipher configuration for GTK_NOT_USED due to missing driver support advertisement"); 8947 u32 cipher = wpa_cipher_to_cipher_suite(params->group_suite); local 8948 wpa_printf(MSG_DEBUG, " * group=0x%x", cipher); 8949 NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, cipher); [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211.c | 3715 wpa_printf(MSG_DEBUG, "nl80211: Supported cipher %02x-%02x-%02x:%d", 5823 static u32 wpa_cipher_to_cipher_suite(unsigned int cipher) argument 5825 switch (cipher) { 8934 u32 cipher = wpa_cipher_to_cipher_suite(params->pairwise_suite); local 8935 wpa_printf(MSG_DEBUG, " * pairwise=0x%x", cipher); 8936 NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE, cipher); 8945 wpa_printf(MSG_DEBUG, " * skip group cipher configuration for GTK_NOT_USED due to missing driver support advertisement"); 8947 u32 cipher = wpa_cipher_to_cipher_suite(params->group_suite); local 8948 wpa_printf(MSG_DEBUG, " * group=0x%x", cipher); 8949 NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, cipher); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211.c | 3715 wpa_printf(MSG_DEBUG, "nl80211: Supported cipher %02x-%02x-%02x:%d", 5823 static u32 wpa_cipher_to_cipher_suite(unsigned int cipher) argument 5825 switch (cipher) { 8934 u32 cipher = wpa_cipher_to_cipher_suite(params->pairwise_suite); local 8935 wpa_printf(MSG_DEBUG, " * pairwise=0x%x", cipher); 8936 NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE, cipher); 8945 wpa_printf(MSG_DEBUG, " * skip group cipher configuration for GTK_NOT_USED due to missing driver support advertisement"); 8947 u32 cipher = wpa_cipher_to_cipher_suite(params->group_suite); local 8948 wpa_printf(MSG_DEBUG, " * group=0x%x", cipher); 8949 NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, cipher); [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.equinox.security_1.0.200.v20100503.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/openssl/ssl/ |
H A D | ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 323 * to the default cipher setup will also be included here. 332 /* The following cipher list is used by default. 333 * It also is substituted when an application-defined cipher list string 383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); 433 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 449 * Cipher OCTET STRING, -- the 3 byte cipher ID 520 const SSL_CIPHER *cipher; member in struct:ssl_session_st 523 * the 'cipher' structure */ 613 /* Set on servers to choose the cipher accordin [all...] |
/external/robolectric/lib/main/ |
H A D | h2-1.2.147.jar | META-INF/MANIFEST.MF META-INF/services/java.sql.Driver org/h2/api/AggregateFunction ... |
H A D | android.jar | META-INF/ META-INF/MANIFEST.MF com/ com/android/ com/android/internal/ com/android/internal/util/ ... |
/external/chromium_org/third_party/libaddressinput/src/java/ |
H A D | android.jar | META-INF/ META-INF/MANIFEST.MF AndroidManifest.xml android/ android/Manifest$permission.class ... |