Searched defs:cipher (Results 51 - 75 of 193) sorted by relevance

12345678

/external/chromium_org/third_party/boringssl/src/ssl/
H A Dssl_asn1.c106 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st
138 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0)))
156 a.cipher.type=V_ASN1_OCTET_STRING;
157 a.cipher.data=buf;
159 if (in->cipher == NULL)
162 l=in->cipher->id;
165 a.cipher.length=3;
172 a.cipher.length=2;
282 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING);
321 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRIN
[all...]
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Drawtransportchannel.h130 // Find out which DTLS-SRTP cipher was negotiated
131 virtual bool GetSrtpCipher(std::string* cipher) { argument
H A Dtransportchannelproxy.cc174 bool TransportChannelProxy::GetSrtpCipher(std::string* cipher) { argument
179 return impl_->GetSrtpCipher(cipher);
/external/openssl/apps/
H A Denc.c124 const EVP_CIPHER *cipher=NULL,*c; local
154 cipher=EVP_get_cipherbyname(pname);
156 if (!do_zlib && !base64 && (cipher == NULL)
159 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
162 BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
292 cipher=c;
295 cipher=NULL;
336 if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER)
342 if (cipher
[all...]
H A Dsmime.c98 const EVP_CIPHER *cipher = NULL; local
152 cipher = EVP_des_ede3_cbc();
154 cipher = EVP_des_cbc();
158 cipher = EVP_seed_cbc();
162 cipher = EVP_rc2_40_cbc();
164 cipher = EVP_rc2_cbc();
166 cipher = EVP_rc2_64_cbc();
170 cipher = EVP_aes_128_cbc();
172 cipher = EVP_aes_192_cbc();
174 cipher
[all...]
/external/openssl/crypto/engine/
H A Deng_openssl.c113 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
215 * we're asked for a cipher we don't support (should not happen).
218 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler.
277 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument
280 if(!cipher)
286 /* We are being asked for a specific cipher */
288 *cipher = &test_r4_cipher;
290 *cipher = &test_r4_40_cipher;
297 *cipher = NULL;
/external/openssl/crypto/evp/
H A Dbio_enc.c83 EVP_CIPHER_CTX cipher; member in struct:enc_struct
92 BIO_TYPE_CIPHER,"cipher",
114 EVP_CIPHER_CTX_init(&ctx->cipher);
134 EVP_CIPHER_CTX_cleanup(&(b->cipher));
187 i=EVP_CipherFinal_ex(&(ctx->cipher),
201 EVP_CipherUpdate(&(ctx->cipher),
260 EVP_CipherUpdate(&(ctx->cipher),
301 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL,
302 ctx->cipher.encrypt);
335 ret=EVP_CipherFinal_ex(&(ctx->cipher),
[all...]
H A Devp_enc.c76 #define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl)
85 /* ctx->cipher=NULL; */
96 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
99 if (cipher)
101 return EVP_CipherInit_ex(ctx,cipher,NULL,key,iv,enc);
104 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, argument
120 if (ctx->engine && ctx->cipher && (!cipher ||
121 (cipher && (cipher
284 EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument
290 EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument
296 EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument
302 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument
[all...]
H A Devp_lib.c68 if (c->cipher->set_asn1_parameters != NULL)
69 ret=c->cipher->set_asn1_parameters(c,type);
70 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1)
81 if (c->cipher->get_asn1_parameters != NULL)
82 ret=c->cipher->get_asn1_parameters(c,type);
83 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1)
122 /* Convert the various cipher NIDs and dummies to a proper OID NID */
188 return ctx->cipher->block_size;
193 return ctx->cipher->do_cipher(ctx,out,in,inl);
198 return ctx->cipher;
201 EVP_CIPHER_flags(const EVP_CIPHER *cipher) argument
221 EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) argument
231 EVP_CIPHER_key_length(const EVP_CIPHER *cipher) argument
241 EVP_CIPHER_nid(const EVP_CIPHER *cipher) argument
[all...]
H A Devp_pbe.c71 /* Setup a cipher context from a PBE algorithm */
158 const EVP_CIPHER *cipher; local
180 cipher = NULL;
183 cipher = EVP_get_cipherbynid(cipher_nid);
184 if (!cipher)
203 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de))
257 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, argument
261 if (cipher)
262 cipher_nid = EVP_CIPHER_nid(cipher);
H A Devp_test.c146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c),
244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument
252 c=EVP_get_cipherbyname(cipher);
359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
368 char *cipher; local
378 cipher=sstrsep(&p,":");
396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
397 && !test_digest(cipher,plaintext,pn,ciphertext,cn))
400 if (strstr(cipher, "AES") == cipher)
[all...]
H A Dp5_crpt2.c201 const EVP_CIPHER *cipher; local
229 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm);
231 if(!cipher) {
237 /* Fixup cipher based on AlgorithmIdentifier */
238 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
/external/openssl/crypto/krb5/
H A Dkrb5_asn.h79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
/external/openssl/crypto/pkcs7/
H A Dpk7_lib.c591 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) argument
610 /* Check cipher OID exists and has data in it*/
611 i = EVP_CIPHER_type(cipher);
617 ec->cipher = cipher;
/external/openssl/include/openssl/
H A Dkrb5_asn.h79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
/external/openssl/ssl/
H A Dssl_asn1.c96 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st
144 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0)))
162 a.cipher.type=V_ASN1_OCTET_STRING;
163 a.cipher.data=buf;
165 if (in->cipher == NULL)
168 l=in->cipher->id;
171 a.cipher.length=3;
178 a.cipher.length=2;
295 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING);
343 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRIN
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_sake.c24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon33662
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_sake.c23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon33695
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_common.c22 * Add support for commonly used cipher suites; don't bother with exportable
103 * tls_get_cipher_suite - Get TLS cipher suite
105 * Returns: Pointer to the cipher data or %NULL if not found
117 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) argument
121 if (tls_ciphers[i].cipher == cipher)
127 int tls_server_key_exchange_allowed(tls_cipher cipher) argument
132 suite = tls_get_cipher_suite(cipher);
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_sake.c24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon33915
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_sake.c23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon33948
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_common.c22 * Add support for commonly used cipher suites; don't bother with exportable
103 * tls_get_cipher_suite - Get TLS cipher suite
105 * Returns: Pointer to the cipher data or %NULL if not found
117 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) argument
121 if (tls_ciphers[i].cipher == cipher)
127 int tls_server_key_exchange_allowed(tls_cipher cipher) argument
132 suite = tls_get_cipher_suite(cipher);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_sake.c24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon34166
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_sake.c23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon34199
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_common.c22 * Add support for commonly used cipher suites; don't bother with exportable
103 * tls_get_cipher_suite - Get TLS cipher suite
105 * Returns: Pointer to the cipher data or %NULL if not found
117 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) argument
121 if (tls_ciphers[i].cipher == cipher)
127 int tls_server_key_exchange_allowed(tls_cipher cipher) argument
132 suite = tls_get_cipher_suite(cipher);

Completed in 304 milliseconds

12345678