/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_openssl.c | 365 const EVP_CIPHER *cipher; local 374 cipher = EVP_rc4(); 381 cipher = EVP_aes_128_cbc(); 385 cipher = EVP_aes_192_cbc(); 389 cipher = EVP_aes_256_cbc(); 399 cipher = EVP_des_ede3_cbc(); 402 cipher = EVP_des_cbc(); 407 cipher = EVP_rc2_ecb(); 417 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) || 427 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NUL [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | tdls.c | 106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer 193 switch (peer->cipher) { 203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", 686 peer->cipher = 0; 1063 * Regardless of the cipher used on the AP connection, select CCMP 1419 * RSN IE is filled only with CCMP cipher suite. 1422 * Regardless of the cipher used on the AP connection, select CCMP 1739 int cipher; local 1918 cipher 2121 int cipher; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | tdls.c | 106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer 193 switch (peer->cipher) { 203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", 686 peer->cipher = 0; 1063 * Regardless of the cipher used on the AP connection, select CCMP 1419 * RSN IE is filled only with CCMP cipher suite. 1422 * Regardless of the cipher used on the AP connection, select CCMP 1739 int cipher; local 1918 cipher 2121 int cipher; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | tdls.c | 106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer 193 switch (peer->cipher) { 203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", 686 peer->cipher = 0; 1063 * Regardless of the cipher used on the AP connection, select CCMP 1419 * RSN IE is filled only with CCMP cipher suite. 1422 * Regardless of the cipher used on the AP connection, select CCMP 1739 int cipher; local 1918 cipher 2121 int cipher; local [all...] |
/external/openssl/ssl/ |
H A D | t1_enc.c | 653 if (s->session->cipher != NULL) 655 if (s->session->cipher->algorithm_enc == SSL_eNULL) 659 if (s->session->cipher->algorithm_enc == SSL_RC4) 755 bs=EVP_CIPHER_block_size(ds->cipher); 757 if (EVP_CIPHER_flags(ds->cipher)&EVP_CIPH_FLAG_AEAD_CIPHER) 818 ds->buf_len, ds->cipher->key_len, 820 ds->cipher->iv_len); 822 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]); 837 if ((EVP_CIPHER_flags(ds->cipher)&EVP_CIPH_FLAG_CUSTOM_CIPHER)
|
H A D | s2_enc.c | 138 /* check for NULL cipher */ 142 bs=ds->cipher->block_size;
|
H A D | ssl_sess.c | 598 if (ret->cipher == NULL) 607 ret->cipher=ssl_get_cipher_by_char(s,&(buf[2])); 609 ret->cipher=ssl_get_cipher_by_char(s,&(buf[1])); 610 if (ret->cipher == NULL) 927 STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) 926 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) argument
|
H A D | s23_clnt.c | 261 SSL_CIPHER *cipher; local 267 cipher = sk_SSL_CIPHER_value(ciphers, i); 268 if (cipher->algorithm_ssl == SSL_SSLV2)
|
/external/openssl/crypto/cms/ |
H A D | cms.h | 161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, 178 const EVP_CIPHER *cipher, unsigned int flags); variable 193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
|
H A D | cms_env.c | 120 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher) argument 131 cipher, NULL, 0)) 821 /* If error or no cipher end of processing */ 823 if (!ret || !ec->cipher) 865 ec->cipher = NULL;
|
H A D | cms_lcl.h | 175 const EVP_CIPHER *cipher; member in struct:CMS_EncryptedContentInfo_st 456 const EVP_CIPHER *cipher,
|
/external/openssl/crypto/pkcs7/ |
H A D | pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 339 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 366 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
H A D | pk7_lib.c | 591 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) argument 610 /* Check cipher OID exists and has data in it*/ 611 i = EVP_CIPHER_type(cipher); 617 ec->cipher = cipher;
|
/external/openssl/include/openssl/ |
H A D | cms.h | 161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, 178 const EVP_CIPHER *cipher, unsigned int flags); variable 193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
|
H A D | pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 339 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 366 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
H A D | pkcs12.h | 181 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 223 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslcon.c | 61 PRUint8 keyLen; /* cipher symkey size in bytes. */ 118 * lsb corresponds to first cipher suite in allCipherSuites[]. 141 /* Construct a socket's list of cipher specs from the global default values. 173 /* ask SSL3 how many cipher suites it has. */ 179 /* Allocate memory to hold cipher specs */ 193 /* fill in cipher specs for SSL2 cipher suites */ 218 ** (e.g. SSL2 or SSL3) is logically enabled, but all its cipher suites 221 ** if no cipher suites are found, it sets the error code and returns 649 ssl2_SendSessionKeyMessage(sslSocket *ss, int cipher, in argument 1263 ssl2_FillInSID(sslSessionID * sid, int cipher, PRUint8 *keyData, int keyLen, PRUint8 *ca, int caLen, int keyBits, int secretKeyBits, SSLSignType authAlgorithm, PRUint32 authKeyBits, SSLKEAType keaType, PRUint32 keaKeyBits) argument 1545 ssl2_ServerSetupSessionCypher(sslSocket *ss, int cipher, unsigned int keyBits, PRUint8 *ck, unsigned int ckLen, PRUint8 *ek, unsigned int ekLen, PRUint8 *ca, unsigned int caLen) argument 2021 int cipher; local 3223 int cipher; local [all...] |
/external/chromium_org/chrome/browser/ui/website_settings/ |
H A D | website_settings.cc | 564 const char *key_exchange, *cipher, *mac; local 567 &key_exchange, &cipher, &mac, &is_aead, cipher_suite); 573 ASCIIToUTF16(cipher), ASCIIToUTF16(key_exchange)); 577 ASCIIToUTF16(cipher), ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));
|
/external/chromium_org/jingle/glue/ |
H A D | channel_socket_adapter_unittest.cc | 48 MOCK_METHOD1(GetSrtpCipher, bool(std::string* cipher));
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | rawtransportchannel.h | 130 // Find out which DTLS-SRTP cipher was negotiated 131 virtual bool GetSrtpCipher(std::string* cipher) { argument
|
/external/openssl/crypto/pkcs12/ |
H A D | pkcs12.h | 181 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 223 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_utils.cc | 65 std::string cipher; local 73 !root.GetString(encrypted::kCipher, &cipher) || 88 cipher != encrypted::kAES256 ||
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_atheros.c | 287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 293 printf("Unable to set group key cipher to %u\n", v); 474 u_int8_t cipher; local 485 cipher = IEEE80211_CIPHER_WEP; 488 cipher = IEEE80211_CIPHER_TKIP; 491 cipher = IEEE80211_CIPHER_AES_CCM; 495 cipher = IEEE80211_CIPHER_AES_CCM_256; 498 cipher = IEEE80211_CIPHER_AES_GCM; 501 cipher [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_atheros.c | 287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 293 printf("Unable to set group key cipher to %u\n", v); 474 u_int8_t cipher; local 485 cipher = IEEE80211_CIPHER_WEP; 488 cipher = IEEE80211_CIPHER_TKIP; 491 cipher = IEEE80211_CIPHER_AES_CCM; 495 cipher = IEEE80211_CIPHER_AES_CCM_256; 498 cipher = IEEE80211_CIPHER_AES_GCM; 501 cipher [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_atheros.c | 287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 293 printf("Unable to set group key cipher to %u\n", v); 474 u_int8_t cipher; local 485 cipher = IEEE80211_CIPHER_WEP; 488 cipher = IEEE80211_CIPHER_TKIP; 491 cipher = IEEE80211_CIPHER_AES_CCM; 495 cipher = IEEE80211_CIPHER_AES_CCM_256; 498 cipher = IEEE80211_CIPHER_AES_GCM; 501 cipher [all...] |