Searched refs:cipher (Results 251 - 275 of 324) sorted by relevance

<<111213

/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_record.c20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite
22 * @cipher_suite: New cipher suite
25 * This function is used to prepare TLS record layer for cipher suite change.
36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
55 data = tls_get_cipher_data(suite->cipher);
68 * tlsv1_record_change_write_cipher - TLS record layer: Change write cipher
70 * Returns: 0 on success (cipher changed), -1 on failure
72 * This function changes TLS record layer to use the new cipher suite
77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
92 "cipher");
[all...]
/external/chromium_org/third_party/boringssl/src/ssl/
H A Ds3_enc.c370 if (s->session->cipher != NULL)
372 if (s->session->cipher->algorithm_enc == SSL_RC4)
441 bs=EVP_CIPHER_block_size(ds->cipher);
H A Ds3_pkt.c710 /* The extra fragment would be couple of cipher blocks, and
930 * Change cipher spec protocol
1124 (s->session != NULL) && (s->session->cipher != NULL))
1187 (s->session != NULL) && (s->session->cipher != NULL) &&
1287 /* Check we have a cipher to change to */
1441 s->session->cipher=s->s3->tmp.new_cipher;
H A Dssl_locl.h112 * ECC cipher suite support in OpenSSL originally developed by
268 * Use the according functions for cipher management instead.
307 /* Not a real MAC, just an indication it is part of cipher */
340 * indicates that the cipher is implemented via an EVP_AEAD. */
356 * only true of legacy cipher suites. */
522 /* Raw values of the cipher list from a client */
825 int ssl_cipher_has_server_public_key(const SSL_CIPHER *cipher);
826 int ssl_cipher_requires_server_key_exchange(const SSL_CIPHER *cipher);
845 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher);
H A Dd1_clnt.c414 s->session->cipher=s->s3->tmp.new_cipher;
H A Dd1_srvr.c539 s->session->cipher=s->s3->tmp.new_cipher;
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Ddtlstransportchannel_unittest.cc221 std::string cipher; local
223 bool rv = (*it)->GetSrtpCipher(&cipher);
227 ASSERT_EQ(cipher, expected_cipher);
/external/openssl/crypto/threads/
H A Dmttest.c137 static char *cipher=NULL; variable
272 if (cipher == NULL && OPENSSL_issetugid() == 0)
273 cipher=getenv("SSL_CIPHER");
/external/openssl/ssl/
H A Ds2_srvr.c401 s->session->cipher= cp;
453 is_export=SSL_C_IS_EXPORT(s->session->cipher);
462 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC)
493 /* incorrect number of key bytes for non export cipher */
589 /* get session-id before cipher stuff so we can get out session
678 /* done cipher selection */
783 s2n(n,p); /* add cipher length */
H A Ds3_pkt.c765 /* The extra fragment would be couple of cipher blocks, and
977 * Change cipher spec protocol
1176 (s->session != NULL) && (s->session->cipher != NULL))
1239 (s->session != NULL) && (s->session->cipher != NULL) &&
1339 /* Check we have a cipher to change to */
1497 s->session->cipher=s->s3->tmp.new_cipher;
H A Dssl_lib.c115 * ECC cipher suite support in OpenSSL originally developed by
207 * the old cipher. It is sort of a SSL_clear_lite :-) */
1332 * was unable to find a cipher matching the given rule string
1333 * (for example if the rule string specifies a cipher which
1896 /* ret->cipher=NULL;*/
2187 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) argument
2204 kl=SSL_C_EXPORT_PKEYLENGTH(cipher);
2314 * ECDSA cipher suites depending on the key usage extension.
2541 EVP_PKEY *ssl_get_sign_pkey(SSL *s,const SSL_CIPHER *cipher, const EVP_MD **pmd) argument
2546 alg_a = cipher
[all...]
H A Dd1_pkt.c740 * Change cipher spec protocol
1040 (s->session != NULL) && (s->session->cipher != NULL))
1542 (EVP_CIPHER_mode( s->enc_write_ctx->cipher ) & EVP_CIPH_CBC_MODE))
1543 bs = EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
H A Ds3_cbc.c74 * block_size: the block size of the cipher used to encrypt the record.
108 * block_size: the block size of the cipher used to encrypt the record.
158 if (EVP_CIPHER_flags(s->enc_read_ctx->cipher)&EVP_CIPH_FLAG_AEAD_CIPHER)
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpas_glue.c218 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local
221 wpa_s->pairwise_cipher = cipher;
223 wpa_s->group_cipher = cipher;
/external/openssl/crypto/evp/
H A De_aes.c235 mode = ctx->cipher->flags & EVP_CIPH_MODE;
276 size_t bl = ctx->cipher->block_size;
534 mode = ctx->cipher->flags & EVP_CIPH_MODE;
657 size_t bl = ctx->cipher->block_size;
773 gctx->ivlen = c->cipher->iv_len;
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_fast.c1447 "provisioning TLS cipher suites");
1453 "provisioning TLS cipher suites");
1464 "cipher suites for provisioning");
1572 char cipher[80]; local
1579 cipher, sizeof(cipher)) < 0 ||
1580 os_strstr(cipher, "ADH-") ||
1581 os_strstr(cipher, "anon"))) {
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_fast.c1447 "provisioning TLS cipher suites");
1453 "provisioning TLS cipher suites");
1464 "cipher suites for provisioning");
1572 char cipher[80]; local
1579 cipher, sizeof(cipher)) < 0 ||
1580 os_strstr(cipher, "ADH-") ||
1581 os_strstr(cipher, "anon"))) {
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_fast.c1447 "provisioning TLS cipher suites");
1453 "provisioning TLS cipher suites");
1464 "cipher suites for provisioning");
1572 char cipher[80]; local
1579 cipher, sizeof(cipher)) < 0 ||
1580 os_strstr(cipher, "ADH-") ||
1581 os_strstr(cipher, "anon"))) {
/external/chromium_org/net/third_party/nss/ssl/
H A Dssl3ext.c1100 + 10 /* cipher spec parameters */
1148 /* cipher spec parameters */
1582 /* Read cipher spec parameters. */
2033 /* Length of the SRTP cipher list */
2062 /* Length of the SRTP cipher list */
2065 /* The selected cipher */
2082 PRUint16 cipher = 0; local
2093 /* Get the cipher list */
2104 /* Get the selected cipher */
2105 cipher
[all...]
H A Dsslsock.c1135 /* function tells us if the cipher suite is one that we no longer support. */
1337 const PRUint16 *cipher; local
1339 for (cipher = SSL_ImplementedCiphers; *cipher != 0; ++cipher) {
1340 status = SSL_SetPolicy(*cipher, SSL_ALLOWED);
1606 SSL_DBG(("%d: SSL[%d]: invalid or unimplemented SRTP cipher "
1621 SSL_GetSRTPCipher(PRFileDesc *fd, PRUint16 *cipher) argument
1638 *cipher = ss->ssl3.dtlsSRTPCipherSuite;
/external/ppp/pppd/
H A Deap.c651 u_char clear[8], cipher[8], dig[SHA_DIGESTSIZE], *optr, *cp; local
780 if (!DesEncrypt(clear, cipher)) {
786 outp += b64enc(&b64, cipher, 8, outp);
788 (void) DesEncrypt(cp, cipher);
789 outp += b64enc(&b64, cipher, 8, outp);
800 (void) DesEncrypt(clear, cipher);
801 outp += b64enc(&b64, cipher, 8, outp);
/external/openssl/crypto/x509/
H A Dx509.h505 EVP_CIPHER_INFO cipher; member in struct:private_key_st
1166 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
1168 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
/external/openssl/include/openssl/
H A Dx509.h505 EVP_CIPHER_INFO cipher; member in struct:private_key_st
1166 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
1168 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Devp.h63 /* OpenSSL included digest and cipher functions in this header so we include
68 #include <openssl/cipher.h>
H A Dx509.h73 #include <openssl/cipher.h>
459 EVP_CIPHER_INFO cipher; member in struct:private_key_st
1129 OPENSSL_EXPORT X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
1131 OPENSSL_EXPORT X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,

Completed in 9226 milliseconds

<<111213