/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_asn1.c | 106 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st 138 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) 156 a.cipher.type=V_ASN1_OCTET_STRING; 157 a.cipher.data=buf; 159 if (in->cipher == NULL) 162 l=in->cipher->id; 165 a.cipher.length=3; 172 a.cipher.length=2; 282 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); 321 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRIN [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | rawtransportchannel.h | 130 // Find out which DTLS-SRTP cipher was negotiated 131 virtual bool GetSrtpCipher(std::string* cipher) { argument
|
H A D | transportchannelproxy.cc | 174 bool TransportChannelProxy::GetSrtpCipher(std::string* cipher) { argument 179 return impl_->GetSrtpCipher(cipher);
|
/external/openssl/apps/ |
H A D | enc.c | 124 const EVP_CIPHER *cipher=NULL,*c; local 154 cipher=EVP_get_cipherbyname(pname); 156 if (!do_zlib && !base64 && (cipher == NULL) 159 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 162 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 292 cipher=c; 295 cipher=NULL; 336 if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) 342 if (cipher [all...] |
H A D | smime.c | 98 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_des_ede3_cbc(); 154 cipher = EVP_des_cbc(); 158 cipher = EVP_seed_cbc(); 162 cipher = EVP_rc2_40_cbc(); 164 cipher = EVP_rc2_cbc(); 166 cipher = EVP_rc2_64_cbc(); 170 cipher = EVP_aes_128_cbc(); 172 cipher = EVP_aes_192_cbc(); 174 cipher [all...] |
/external/openssl/crypto/engine/ |
H A D | eng_openssl.c | 113 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 215 * we're asked for a cipher we don't support (should not happen). 218 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler. 277 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 280 if(!cipher) 286 /* We are being asked for a specific cipher */ 288 *cipher = &test_r4_cipher; 290 *cipher = &test_r4_40_cipher; 297 *cipher = NULL;
|
/external/openssl/crypto/evp/ |
H A D | bio_enc.c | 83 EVP_CIPHER_CTX cipher; member in struct:enc_struct 92 BIO_TYPE_CIPHER,"cipher", 114 EVP_CIPHER_CTX_init(&ctx->cipher); 134 EVP_CIPHER_CTX_cleanup(&(b->cipher)); 187 i=EVP_CipherFinal_ex(&(ctx->cipher), 201 EVP_CipherUpdate(&(ctx->cipher), 260 EVP_CipherUpdate(&(ctx->cipher), 301 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, 302 ctx->cipher.encrypt); 335 ret=EVP_CipherFinal_ex(&(ctx->cipher), [all...] |
H A D | evp_enc.c | 76 #define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl) 85 /* ctx->cipher=NULL; */ 96 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 99 if (cipher) 101 return EVP_CipherInit_ex(ctx,cipher,NULL,key,iv,enc); 104 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, argument 120 if (ctx->engine && ctx->cipher && (!cipher || 121 (cipher && (cipher 284 EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 290 EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument 296 EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 302 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument [all...] |
H A D | evp_lib.c | 68 if (c->cipher->set_asn1_parameters != NULL) 69 ret=c->cipher->set_asn1_parameters(c,type); 70 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) 81 if (c->cipher->get_asn1_parameters != NULL) 82 ret=c->cipher->get_asn1_parameters(c,type); 83 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) 122 /* Convert the various cipher NIDs and dummies to a proper OID NID */ 188 return ctx->cipher->block_size; 193 return ctx->cipher->do_cipher(ctx,out,in,inl); 198 return ctx->cipher; 201 EVP_CIPHER_flags(const EVP_CIPHER *cipher) argument 221 EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) argument 231 EVP_CIPHER_key_length(const EVP_CIPHER *cipher) argument 241 EVP_CIPHER_nid(const EVP_CIPHER *cipher) argument [all...] |
H A D | evp_pbe.c | 71 /* Setup a cipher context from a PBE algorithm */ 158 const EVP_CIPHER *cipher; local 180 cipher = NULL; 183 cipher = EVP_get_cipherbynid(cipher_nid); 184 if (!cipher) 203 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) 257 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, argument 261 if (cipher) 262 cipher_nid = EVP_CIPHER_nid(cipher);
|
H A D | evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
H A D | p5_crpt2.c | 201 const EVP_CIPHER *cipher; local 229 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); 231 if(!cipher) { 237 /* Fixup cipher based on AlgorithmIdentifier */ 238 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
|
/external/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 591 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) argument 610 /* Check cipher OID exists and has data in it*/ 611 i = EVP_CIPHER_type(cipher); 617 ec->cipher = cipher;
|
/external/openssl/include/openssl/ |
H A D | krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
/external/openssl/ssl/ |
H A D | ssl_asn1.c | 96 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st 144 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) 162 a.cipher.type=V_ASN1_OCTET_STRING; 163 a.cipher.data=buf; 165 if (in->cipher == NULL) 168 l=in->cipher->id; 171 a.cipher.length=3; 178 a.cipher.length=2; 295 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); 343 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRIN [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_sake.c | 24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon33662
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_sake.c | 23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon33695
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_common.c | 22 * Add support for commonly used cipher suites; don't bother with exportable 103 * tls_get_cipher_suite - Get TLS cipher suite 105 * Returns: Pointer to the cipher data or %NULL if not found 117 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) argument 121 if (tls_ciphers[i].cipher == cipher) 127 int tls_server_key_exchange_allowed(tls_cipher cipher) argument 132 suite = tls_get_cipher_suite(cipher);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_sake.c | 24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon33915
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_sake.c | 23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon33948
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_common.c | 22 * Add support for commonly used cipher suites; don't bother with exportable 103 * tls_get_cipher_suite - Get TLS cipher suite 105 * Returns: Pointer to the cipher data or %NULL if not found 117 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) argument 121 if (tls_ciphers[i].cipher == cipher) 127 int tls_server_key_exchange_allowed(tls_cipher cipher) argument 132 suite = tls_get_cipher_suite(cipher);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_sake.c | 24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon34166
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_sake.c | 23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon34199
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.c | 22 * Add support for commonly used cipher suites; don't bother with exportable 103 * tls_get_cipher_suite - Get TLS cipher suite 105 * Returns: Pointer to the cipher data or %NULL if not found 117 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) argument 121 if (tls_ciphers[i].cipher == cipher) 127 int tls_server_key_exchange_allowed(tls_cipher cipher) argument 132 suite = tls_get_cipher_suite(cipher);
|