Searched defs:cipher (Results 101 - 125 of 193) sorted by relevance

12345678

/external/chromium_org/chromeos/network/onc/
H A Donc_utils.cc65 std::string cipher; local
73 !root.GetString(encrypted::kCipher, &cipher) ||
88 cipher != encrypted::kAES256 ||
/external/chromium_org/net/socket/
H A Dssl_client_socket_openssl.cc79 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; } argument
605 const SSL_CIPHER* cipher = SSL_get_current_cipher(ssl_); local
606 CHECK(cipher);
607 ssl_info->security_bits = SSL_CIPHER_get_bits(cipher, NULL);
610 SSL_CIPHER_get_id(cipher), 0 /* no compression */,
622 DVLOG(3) << "Encoded connection status: cipher suite = "
760 // directly remove a cipher by ID.
765 // and HMAC-SHA384 cipher suites, not GCM cipher suite
772 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local
[all...]
/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Dcipher.h73 * cipher algorithm. */
90 /* EVP_enc_null returns a 'cipher' that passes plaintext through as
94 /* EVP_rc2_40_cbc returns a cipher that implements 40-bit RC2 in CBC mode. This
96 * files, which often encrypt the certificate chain using this cipher. It is
100 /* EVP_get_cipherbynid returns the cipher corresponding to the given NID, or
101 * NULL if no such cipher is known. */
134 * |enc| is zero) operation using |cipher|. If |ctx| has been previously
135 * configured with a cipher then |cipher|, |key| and |iv| may be |NULL| and
141 const EVP_CIPHER *cipher, ENGIN
397 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st
444 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st
[all...]
/external/chromium_org/third_party/boringssl/src/ssl/
H A Dssl_ciph.c112 * ECC cipher suite support in OpenSSL originally developed by
171 const SSL_CIPHER *cipher; member in struct:cipher_order_st
243 * for |s->cipher|. It returns 1 on success and 0 on error. */
246 const SSL_CIPHER *c = s->cipher;
283 c=s->cipher;
316 /* TODO(fork): enable the stitched cipher modes. */
343 c=s->cipher;
444 co_list[co_list_num].cipher = c;
501 *ca_curr = ciph_curr->cipher;
510 * or represent a cipher strengt
1211 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument
1382 SSL_CIPHER_get_kx_name(const SSL_CIPHER *cipher) argument
1462 ssl_cipher_has_server_public_key(const SSL_CIPHER *cipher) argument
1489 ssl_cipher_requires_server_key_exchange(const SSL_CIPHER *cipher) argument
[all...]
H A Dssl_sess.c840 STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg), void *arg)
839 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg), void *arg) argument
H A Dt1_enc.c344 /* mac_key_and_key is used to merge the MAC and cipher keys for an AEAD
345 * which simulates pre-AEAD cipher suites. It needs to be large enough
352 * cipher suites). */
402 /* tls1_change_cipher_state_cipher performs the work needed to switch cipher
414 const EVP_CIPHER *cipher = s->s3->tmp.new_sym_enc; local
470 EVP_CipherInit_ex(cipher_ctx, cipher, NULL /* engine */, key, iv, !is_read);
493 const EVP_CIPHER *cipher = s->s3->tmp.new_sym_enc; local
511 * cipher suites) the key length reported by
523 key_len = EVP_CIPHER_key_length(cipher);
524 iv_len = EVP_CIPHER_iv_length(cipher);
[all...]
/external/chromium_org/third_party/webrtc/base/
H A Dopensslstreamadapter.cc44 // SRTP cipher suite table
255 for (std::vector<std::string>::const_iterator cipher = ciphers.begin();
256 cipher != ciphers.end(); ++cipher) {
260 if (*cipher == entry->external_name) {
270 LOG(LS_ERROR) << "Could not find cipher: " << *cipher;
285 bool OpenSSLStreamAdapter::GetDtlsSrtpCipher(std::string* cipher) { argument
300 *cipher = entry->external_name;
H A Dnssstreamadapter.cc55 // SRTP cipher suite table
896 for (std::vector<std::string>::const_iterator cipher = ciphers.begin();
897 cipher != ciphers.end(); ++cipher) {
901 if (*cipher == entry->external_name) {
909 LOG(LS_ERROR) << "Could not find cipher: " << *cipher;
925 bool NSSStreamAdapter::GetDtlsSrtpCipher(std::string* cipher) { argument
940 *cipher = entry->external_name;
/external/openssl/apps/
H A Dcms.c114 const EVP_CIPHER *cipher = NULL; local
204 cipher = EVP_des_ede3_cbc();
206 cipher = EVP_des_cbc();
210 cipher = EVP_seed_cbc();
214 cipher = EVP_rc2_40_cbc();
216 cipher = EVP_rc2_cbc();
218 cipher = EVP_rc2_64_cbc();
222 cipher = EVP_aes_128_cbc();
224 cipher = EVP_aes_192_cbc();
226 cipher
[all...]
H A Dreq.c181 const EVP_CIPHER *cipher=NULL; local
199 cipher=EVP_des_ede3_cbc();
746 cipher=NULL;
747 if (nodes) cipher=NULL;
751 if (!PEM_write_bio_PrivateKey(out,pkey,cipher,
/external/openssl/crypto/threads/
H A Dmttest.c137 static char *cipher=NULL; variable
272 if (cipher == NULL && OPENSSL_issetugid() == 0)
273 cipher=getenv("SSL_CIPHER");
/external/openssl/ssl/
H A Dssl_sess.c598 if (ret->cipher == NULL)
607 ret->cipher=ssl_get_cipher_by_char(s,&(buf[2]));
609 ret->cipher=ssl_get_cipher_by_char(s,&(buf[1]));
610 if (ret->cipher == NULL)
927 STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg)
926 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) argument
H A Dssl_ciph.c113 * ECC cipher suite support in OpenSSL originally developed by
220 const SSL_CIPHER *cipher; member in struct:cipher_order_st
494 c=s->cipher;
811 co_list[co_list_num].cipher = c;
875 *ca_curr = ciph_curr->cipher;
884 * or represent a cipher strength value (will be added in any case because algorithms=0).
966 cp = curr->cipher;
1003 /* add the cipher if it has not been added yet. */
1013 /* Move the added cipher to this location */
1073 (curr->cipher
1540 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument
1789 SSL_CIPHER_authentication_method(const SSL_CIPHER* cipher) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dikev2_common.c179 struct crypto_cipher *cipher; local
194 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
195 if (cipher == NULL) {
196 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
200 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
202 crypto_cipher_deinit(cipher);
205 crypto_cipher_deinit(cipher);
214 struct crypto_cipher *cipher; local
229 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
230 if (cipher
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Dikev2_common.c179 struct crypto_cipher *cipher; local
194 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
195 if (cipher == NULL) {
196 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
200 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
202 crypto_cipher_deinit(cipher);
205 crypto_cipher_deinit(cipher);
214 struct crypto_cipher *cipher; local
229 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
230 if (cipher
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dikev2_common.c179 struct crypto_cipher *cipher; local
194 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
195 if (cipher == NULL) {
196 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
200 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
202 crypto_cipher_deinit(cipher);
205 crypto_cipher_deinit(cipher);
214 struct crypto_cipher *cipher; local
229 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
230 if (cipher
[all...]
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/
H A Dpkcs8.c64 #include <openssl/cipher.h>
211 const EVP_CIPHER *cipher, const EVP_MD *md,
241 iterations, EVP_CIPHER_key_length(cipher), key, md)) {
247 iterations, EVP_CIPHER_iv_length(cipher), iv, md)) {
253 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, is_encrypt);
261 const EVP_CIPHER *cipher, const EVP_MD *md,
288 const EVP_CIPHER *cipher; local
315 cipher = NULL;
317 cipher = suite->cipher_func();
318 if (!cipher) {
209 pkcs12_pbe_keyivgen(EVP_CIPHER_CTX *ctx, const uint8_t *pass_raw, size_t pass_raw_len, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int is_encrypt) argument
481 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int pass_len, uint8_t *salt, size_t salt_len, int iterations, PKCS8_PRIV_KEY_INFO *p8inf) argument
[all...]
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Dfakesession.h244 virtual bool GetSrtpCipher(std::string* cipher) { argument
246 *cipher = chosen_srtp_cipher_;
/external/chromium_org/third_party/libsrtp/srtp/srtp/
H A Dsrtp.c118 /* allocate cipher */
149 * the cipher
201 /* deallocate cipher, if it is not the same as that in template */
230 * deallocate rtcp cipher, if it is not the same as that in
270 * initializes it using the cipher and auth of the stream_template
291 /* set cipher and auth pointers to those of the template */
333 * srtp_kdf_init(&kdf, cipher_id, k, keylen) initializes kdf to use cipher
360 cipher_t *cipher; /* cipher used for key derivation */ member in struct:__anon12847
367 stat = crypto_kernel_alloc_cipher(cipher_id, &kdf->cipher, lengt
427 base_key_length(const cipher_type_t *cipher, int key_length) argument
[all...]
/external/openssl/crypto/cms/
H A Dcms_lcl.h175 const EVP_CIPHER *cipher; member in struct:CMS_EncryptedContentInfo_st
456 const EVP_CIPHER *cipher,
/external/openssl/crypto/engine/
H A Deng_cryptodev.c101 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
257 sess.cipher = ciphers[i].id;
298 sess.cipher = 0;
377 if ((inl % ctx->cipher->block_size) != 0)
391 if (ctx->cipher->iv_len) {
394 iiv = in + inl - ctx->cipher->iv_len;
395 memcpy(save_iv, iiv, ctx->cipher->iv_len);
407 if (ctx->cipher->iv_len) {
409 iiv = out + inl - ctx->cipher->iv_len;
412 memcpy(ctx->iv, iiv, ctx->cipher
423 int cipher = -1, i; local
609 cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) argument
[all...]
/external/pdfium/core/src/fpdfapi/fpdf_parser/
H A Dfpdf_parser_encrypt.cpp106 static FX_BOOL _LoadCryptInfo(CPDF_Dictionary* pEncryptDict, FX_BSTR name, int& cipher, int& keylen) argument
110 cipher = FXCIPHER_RC4;
118 cipher = FXCIPHER_NONE;
139 cipher = FXCIPHER_AES;
170 FX_BOOL CPDF_StandardSecurityHandler::LoadDict(CPDF_Dictionary* pEncryptDict, FX_DWORD type, int& cipher, int& key_len) argument
185 if (!_LoadCryptInfo(pEncryptDict, strf_name, cipher, key_len)) {
188 m_Cipher = cipher;
193 FX_BOOL CPDF_StandardSecurityHandler::GetCryptInfo(int& cipher, FX_LPCBYTE& buffer, int& keylen) argument
195 cipher = m_Cipher;
502 int cipher local
884 Init(int cipher, FX_LPCBYTE key, int keylen) argument
[all...]
/external/ppp/pppd/
H A Deap.c651 u_char clear[8], cipher[8], dig[SHA_DIGESTSIZE], *optr, *cp; local
780 if (!DesEncrypt(clear, cipher)) {
786 outp += b64enc(&b64, cipher, 8, outp);
788 (void) DesEncrypt(cp, cipher);
789 outp += b64enc(&b64, cipher, 8, outp);
800 (void) DesEncrypt(clear, cipher);
801 outp += b64enc(&b64, cipher, 8, outp);
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.c406 static int wpa_cipher_valid_group(int cipher) argument
408 return wpa_cipher_valid_pairwise(cipher) ||
409 cipher == WPA_CIPHER_WEP104 ||
410 cipher == WPA_CIPHER_WEP40 ||
411 cipher == WPA_CIPHER_GTK_NOT_USED;
416 int wpa_cipher_valid_mgmt_group(int cipher) argument
418 return cipher == WPA_CIPHER_AES_128_CMAC ||
419 cipher == WPA_CIPHER_BIP_GMAC_128 ||
420 cipher == WPA_CIPHER_BIP_GMAC_256 ||
421 cipher
936 wpa_cipher_txt(int cipher) argument
1146 wpa_cipher_key_len(int cipher) argument
1171 wpa_cipher_rsc_len(int cipher) argument
1189 wpa_cipher_to_alg(int cipher) argument
1218 wpa_cipher_valid_pairwise(int cipher) argument
1228 wpa_cipher_to_suite(int proto, int cipher) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_openssl.c365 const EVP_CIPHER *cipher; local
374 cipher = EVP_rc4();
381 cipher = EVP_aes_128_cbc();
385 cipher = EVP_aes_192_cbc();
389 cipher = EVP_aes_256_cbc();
399 cipher = EVP_des_ede3_cbc();
402 cipher = EVP_des_cbc();
407 cipher = EVP_rc2_ecb();
417 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) ||
427 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NUL
[all...]

Completed in 440 milliseconds

12345678