Searched refs:cipher (Results 201 - 225 of 324) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_openssl.c365 const EVP_CIPHER *cipher; local
374 cipher = EVP_rc4();
381 cipher = EVP_aes_128_cbc();
385 cipher = EVP_aes_192_cbc();
389 cipher = EVP_aes_256_cbc();
399 cipher = EVP_des_ede3_cbc();
402 cipher = EVP_des_cbc();
407 cipher = EVP_rc2_ecb();
417 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) ||
427 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NUL
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dtdls.c106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer
193 switch (peer->cipher) {
203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
686 peer->cipher = 0;
1063 * Regardless of the cipher used on the AP connection, select CCMP
1419 * RSN IE is filled only with CCMP cipher suite.
1422 * Regardless of the cipher used on the AP connection, select CCMP
1739 int cipher; local
1918 cipher
2121 int cipher; local
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dtdls.c106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer
193 switch (peer->cipher) {
203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
686 peer->cipher = 0;
1063 * Regardless of the cipher used on the AP connection, select CCMP
1419 * RSN IE is filled only with CCMP cipher suite.
1422 * Regardless of the cipher used on the AP connection, select CCMP
1739 int cipher; local
1918 cipher
2121 int cipher; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dtdls.c106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer
193 switch (peer->cipher) {
203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
686 peer->cipher = 0;
1063 * Regardless of the cipher used on the AP connection, select CCMP
1419 * RSN IE is filled only with CCMP cipher suite.
1422 * Regardless of the cipher used on the AP connection, select CCMP
1739 int cipher; local
1918 cipher
2121 int cipher; local
[all...]
/external/openssl/ssl/
H A Dt1_enc.c653 if (s->session->cipher != NULL)
655 if (s->session->cipher->algorithm_enc == SSL_eNULL)
659 if (s->session->cipher->algorithm_enc == SSL_RC4)
755 bs=EVP_CIPHER_block_size(ds->cipher);
757 if (EVP_CIPHER_flags(ds->cipher)&EVP_CIPH_FLAG_AEAD_CIPHER)
818 ds->buf_len, ds->cipher->key_len,
820 ds->cipher->iv_len);
822 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
837 if ((EVP_CIPHER_flags(ds->cipher)&EVP_CIPH_FLAG_CUSTOM_CIPHER)
H A Ds2_enc.c138 /* check for NULL cipher */
142 bs=ds->cipher->block_size;
H A Dssl_sess.c598 if (ret->cipher == NULL)
607 ret->cipher=ssl_get_cipher_by_char(s,&(buf[2]));
609 ret->cipher=ssl_get_cipher_by_char(s,&(buf[1]));
610 if (ret->cipher == NULL)
927 STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg)
926 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) argument
H A Ds23_clnt.c261 SSL_CIPHER *cipher; local
267 cipher = sk_SSL_CIPHER_value(ciphers, i);
268 if (cipher->algorithm_ssl == SSL_SSLV2)
/external/openssl/crypto/cms/
H A Dcms.h161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher,
178 const EVP_CIPHER *cipher, unsigned int flags); variable
193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
H A Dcms_env.c120 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher) argument
131 cipher, NULL, 0))
821 /* If error or no cipher end of processing */
823 if (!ret || !ec->cipher)
865 ec->cipher = NULL;
H A Dcms_lcl.h175 const EVP_CIPHER *cipher; member in struct:CMS_EncryptedContentInfo_st
456 const EVP_CIPHER *cipher,
/external/openssl/crypto/pkcs7/
H A Dpkcs7.h139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
339 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
366 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
H A Dpk7_lib.c591 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) argument
610 /* Check cipher OID exists and has data in it*/
611 i = EVP_CIPHER_type(cipher);
617 ec->cipher = cipher;
/external/openssl/include/openssl/
H A Dcms.h161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher,
178 const EVP_CIPHER *cipher, unsigned int flags); variable
193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
H A Dpkcs7.h139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
339 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
366 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
H A Dpkcs12.h181 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
223 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
/external/chromium_org/net/third_party/nss/ssl/
H A Dsslcon.c61 PRUint8 keyLen; /* cipher symkey size in bytes. */
118 * lsb corresponds to first cipher suite in allCipherSuites[].
141 /* Construct a socket's list of cipher specs from the global default values.
173 /* ask SSL3 how many cipher suites it has. */
179 /* Allocate memory to hold cipher specs */
193 /* fill in cipher specs for SSL2 cipher suites */
218 ** (e.g. SSL2 or SSL3) is logically enabled, but all its cipher suites
221 ** if no cipher suites are found, it sets the error code and returns
649 ssl2_SendSessionKeyMessage(sslSocket *ss, int cipher, in argument
1263 ssl2_FillInSID(sslSessionID * sid, int cipher, PRUint8 *keyData, int keyLen, PRUint8 *ca, int caLen, int keyBits, int secretKeyBits, SSLSignType authAlgorithm, PRUint32 authKeyBits, SSLKEAType keaType, PRUint32 keaKeyBits) argument
1545 ssl2_ServerSetupSessionCypher(sslSocket *ss, int cipher, unsigned int keyBits, PRUint8 *ck, unsigned int ckLen, PRUint8 *ek, unsigned int ekLen, PRUint8 *ca, unsigned int caLen) argument
2021 int cipher; local
3223 int cipher; local
[all...]
/external/chromium_org/chrome/browser/ui/website_settings/
H A Dwebsite_settings.cc564 const char *key_exchange, *cipher, *mac; local
567 &key_exchange, &cipher, &mac, &is_aead, cipher_suite);
573 ASCIIToUTF16(cipher), ASCIIToUTF16(key_exchange));
577 ASCIIToUTF16(cipher), ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));
/external/chromium_org/jingle/glue/
H A Dchannel_socket_adapter_unittest.cc48 MOCK_METHOD1(GetSrtpCipher, bool(std::string* cipher));
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Drawtransportchannel.h130 // Find out which DTLS-SRTP cipher was negotiated
131 virtual bool GetSrtpCipher(std::string* cipher) { argument
/external/openssl/crypto/pkcs12/
H A Dpkcs12.h181 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
223 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
/external/chromium_org/chromeos/network/onc/
H A Donc_utils.cc65 std::string cipher; local
73 !root.GetString(encrypted::kCipher, &cipher) ||
88 cipher != encrypted::kAES256 ||
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_atheros.c287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
293 printf("Unable to set group key cipher to %u\n", v);
474 u_int8_t cipher; local
485 cipher = IEEE80211_CIPHER_WEP;
488 cipher = IEEE80211_CIPHER_TKIP;
491 cipher = IEEE80211_CIPHER_AES_CCM;
495 cipher = IEEE80211_CIPHER_AES_CCM_256;
498 cipher = IEEE80211_CIPHER_AES_GCM;
501 cipher
[all...]
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_atheros.c287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
293 printf("Unable to set group key cipher to %u\n", v);
474 u_int8_t cipher; local
485 cipher = IEEE80211_CIPHER_WEP;
488 cipher = IEEE80211_CIPHER_TKIP;
491 cipher = IEEE80211_CIPHER_AES_CCM;
495 cipher = IEEE80211_CIPHER_AES_CCM_256;
498 cipher = IEEE80211_CIPHER_AES_GCM;
501 cipher
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_atheros.c287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
293 printf("Unable to set group key cipher to %u\n", v);
474 u_int8_t cipher; local
485 cipher = IEEE80211_CIPHER_WEP;
488 cipher = IEEE80211_CIPHER_TKIP;
491 cipher = IEEE80211_CIPHER_AES_CCM;
495 cipher = IEEE80211_CIPHER_AES_CCM_256;
498 cipher = IEEE80211_CIPHER_AES_GCM;
501 cipher
[all...]

Completed in 4118 milliseconds

1234567891011>>