/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite 22 * @cipher_suite: New cipher suite 25 * This function is used to prepare TLS record layer for cipher suite change. 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 55 data = tls_get_cipher_data(suite->cipher); 68 * tlsv1_record_change_write_cipher - TLS record layer: Change write cipher 70 * Returns: 0 on success (cipher changed), -1 on failure 72 * This function changes TLS record layer to use the new cipher suite 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 92 "cipher"); [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_enc.c | 370 if (s->session->cipher != NULL) 372 if (s->session->cipher->algorithm_enc == SSL_RC4) 441 bs=EVP_CIPHER_block_size(ds->cipher);
|
H A D | s3_pkt.c | 710 /* The extra fragment would be couple of cipher blocks, and 930 * Change cipher spec protocol 1124 (s->session != NULL) && (s->session->cipher != NULL)) 1187 (s->session != NULL) && (s->session->cipher != NULL) && 1287 /* Check we have a cipher to change to */ 1441 s->session->cipher=s->s3->tmp.new_cipher;
|
H A D | ssl_locl.h | 112 * ECC cipher suite support in OpenSSL originally developed by 268 * Use the according functions for cipher management instead. 307 /* Not a real MAC, just an indication it is part of cipher */ 340 * indicates that the cipher is implemented via an EVP_AEAD. */ 356 * only true of legacy cipher suites. */ 522 /* Raw values of the cipher list from a client */ 825 int ssl_cipher_has_server_public_key(const SSL_CIPHER *cipher); 826 int ssl_cipher_requires_server_key_exchange(const SSL_CIPHER *cipher); 845 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher);
|
H A D | d1_clnt.c | 414 s->session->cipher=s->s3->tmp.new_cipher;
|
H A D | d1_srvr.c | 539 s->session->cipher=s->s3->tmp.new_cipher;
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | dtlstransportchannel_unittest.cc | 221 std::string cipher; local 223 bool rv = (*it)->GetSrtpCipher(&cipher); 227 ASSERT_EQ(cipher, expected_cipher);
|
/external/openssl/crypto/threads/ |
H A D | mttest.c | 137 static char *cipher=NULL; variable 272 if (cipher == NULL && OPENSSL_issetugid() == 0) 273 cipher=getenv("SSL_CIPHER");
|
/external/openssl/ssl/ |
H A D | s2_srvr.c | 401 s->session->cipher= cp; 453 is_export=SSL_C_IS_EXPORT(s->session->cipher); 462 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 493 /* incorrect number of key bytes for non export cipher */ 589 /* get session-id before cipher stuff so we can get out session 678 /* done cipher selection */ 783 s2n(n,p); /* add cipher length */
|
H A D | s3_pkt.c | 765 /* The extra fragment would be couple of cipher blocks, and 977 * Change cipher spec protocol 1176 (s->session != NULL) && (s->session->cipher != NULL)) 1239 (s->session != NULL) && (s->session->cipher != NULL) && 1339 /* Check we have a cipher to change to */ 1497 s->session->cipher=s->s3->tmp.new_cipher;
|
H A D | ssl_lib.c | 115 * ECC cipher suite support in OpenSSL originally developed by 207 * the old cipher. It is sort of a SSL_clear_lite :-) */ 1332 * was unable to find a cipher matching the given rule string 1333 * (for example if the rule string specifies a cipher which 1896 /* ret->cipher=NULL;*/ 2187 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) argument 2204 kl=SSL_C_EXPORT_PKEYLENGTH(cipher); 2314 * ECDSA cipher suites depending on the key usage extension. 2541 EVP_PKEY *ssl_get_sign_pkey(SSL *s,const SSL_CIPHER *cipher, const EVP_MD **pmd) argument 2546 alg_a = cipher [all...] |
H A D | d1_pkt.c | 740 * Change cipher spec protocol 1040 (s->session != NULL) && (s->session->cipher != NULL)) 1542 (EVP_CIPHER_mode( s->enc_write_ctx->cipher ) & EVP_CIPH_CBC_MODE)) 1543 bs = EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
|
H A D | s3_cbc.c | 74 * block_size: the block size of the cipher used to encrypt the record. 108 * block_size: the block size of the cipher used to encrypt the record. 158 if (EVP_CIPHER_flags(s->enc_read_ctx->cipher)&EVP_CIPH_FLAG_AEAD_CIPHER)
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_glue.c | 218 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local 221 wpa_s->pairwise_cipher = cipher; 223 wpa_s->group_cipher = cipher;
|
/external/openssl/crypto/evp/ |
H A D | e_aes.c | 235 mode = ctx->cipher->flags & EVP_CIPH_MODE; 276 size_t bl = ctx->cipher->block_size; 534 mode = ctx->cipher->flags & EVP_CIPH_MODE; 657 size_t bl = ctx->cipher->block_size; 773 gctx->ivlen = c->cipher->iv_len;
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast.c | 1447 "provisioning TLS cipher suites"); 1453 "provisioning TLS cipher suites"); 1464 "cipher suites for provisioning"); 1572 char cipher[80]; local 1579 cipher, sizeof(cipher)) < 0 || 1580 os_strstr(cipher, "ADH-") || 1581 os_strstr(cipher, "anon"))) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_fast.c | 1447 "provisioning TLS cipher suites"); 1453 "provisioning TLS cipher suites"); 1464 "cipher suites for provisioning"); 1572 char cipher[80]; local 1579 cipher, sizeof(cipher)) < 0 || 1580 os_strstr(cipher, "ADH-") || 1581 os_strstr(cipher, "anon"))) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast.c | 1447 "provisioning TLS cipher suites"); 1453 "provisioning TLS cipher suites"); 1464 "cipher suites for provisioning"); 1572 char cipher[80]; local 1579 cipher, sizeof(cipher)) < 0 || 1580 os_strstr(cipher, "ADH-") || 1581 os_strstr(cipher, "anon"))) {
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | ssl3ext.c | 1100 + 10 /* cipher spec parameters */ 1148 /* cipher spec parameters */ 1582 /* Read cipher spec parameters. */ 2033 /* Length of the SRTP cipher list */ 2062 /* Length of the SRTP cipher list */ 2065 /* The selected cipher */ 2082 PRUint16 cipher = 0; local 2093 /* Get the cipher list */ 2104 /* Get the selected cipher */ 2105 cipher [all...] |
H A D | sslsock.c | 1135 /* function tells us if the cipher suite is one that we no longer support. */ 1337 const PRUint16 *cipher; local 1339 for (cipher = SSL_ImplementedCiphers; *cipher != 0; ++cipher) { 1340 status = SSL_SetPolicy(*cipher, SSL_ALLOWED); 1606 SSL_DBG(("%d: SSL[%d]: invalid or unimplemented SRTP cipher " 1621 SSL_GetSRTPCipher(PRFileDesc *fd, PRUint16 *cipher) argument 1638 *cipher = ss->ssl3.dtlsSRTPCipherSuite;
|
/external/ppp/pppd/ |
H A D | eap.c | 651 u_char clear[8], cipher[8], dig[SHA_DIGESTSIZE], *optr, *cp; local 780 if (!DesEncrypt(clear, cipher)) { 786 outp += b64enc(&b64, cipher, 8, outp); 788 (void) DesEncrypt(cp, cipher); 789 outp += b64enc(&b64, cipher, 8, outp); 800 (void) DesEncrypt(clear, cipher); 801 outp += b64enc(&b64, cipher, 8, outp);
|
/external/openssl/crypto/x509/ |
H A D | x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st 1166 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 1168 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
|
/external/openssl/include/openssl/ |
H A D | x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st 1166 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 1168 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | evp.h | 63 /* OpenSSL included digest and cipher functions in this header so we include 68 #include <openssl/cipher.h>
|
H A D | x509.h | 73 #include <openssl/cipher.h> 459 EVP_CIPHER_INFO cipher; member in struct:private_key_st 1129 OPENSSL_EXPORT X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 1131 OPENSSL_EXPORT X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
|