/external/chromium_org/chromeos/network/onc/ |
H A D | onc_utils.cc | 65 std::string cipher; local 73 !root.GetString(encrypted::kCipher, &cipher) || 88 cipher != encrypted::kAES256 ||
|
/external/chromium_org/net/socket/ |
H A D | ssl_client_socket_openssl.cc | 79 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; } argument 605 const SSL_CIPHER* cipher = SSL_get_current_cipher(ssl_); local 606 CHECK(cipher); 607 ssl_info->security_bits = SSL_CIPHER_get_bits(cipher, NULL); 610 SSL_CIPHER_get_id(cipher), 0 /* no compression */, 622 DVLOG(3) << "Encoded connection status: cipher suite = " 760 // directly remove a cipher by ID. 765 // and HMAC-SHA384 cipher suites, not GCM cipher suite 772 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | cipher.h | 73 * cipher algorithm. */ 90 /* EVP_enc_null returns a 'cipher' that passes plaintext through as 94 /* EVP_rc2_40_cbc returns a cipher that implements 40-bit RC2 in CBC mode. This 96 * files, which often encrypt the certificate chain using this cipher. It is 100 /* EVP_get_cipherbynid returns the cipher corresponding to the given NID, or 101 * NULL if no such cipher is known. */ 134 * |enc| is zero) operation using |cipher|. If |ctx| has been previously 135 * configured with a cipher then |cipher|, |key| and |iv| may be |NULL| and 141 const EVP_CIPHER *cipher, ENGIN 397 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st 444 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_ciph.c | 112 * ECC cipher suite support in OpenSSL originally developed by 171 const SSL_CIPHER *cipher; member in struct:cipher_order_st 243 * for |s->cipher|. It returns 1 on success and 0 on error. */ 246 const SSL_CIPHER *c = s->cipher; 283 c=s->cipher; 316 /* TODO(fork): enable the stitched cipher modes. */ 343 c=s->cipher; 444 co_list[co_list_num].cipher = c; 501 *ca_curr = ciph_curr->cipher; 510 * or represent a cipher strengt 1211 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument 1382 SSL_CIPHER_get_kx_name(const SSL_CIPHER *cipher) argument 1462 ssl_cipher_has_server_public_key(const SSL_CIPHER *cipher) argument 1489 ssl_cipher_requires_server_key_exchange(const SSL_CIPHER *cipher) argument [all...] |
H A D | ssl_sess.c | 840 STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg), void *arg) 839 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg), void *arg) argument
|
H A D | t1_enc.c | 344 /* mac_key_and_key is used to merge the MAC and cipher keys for an AEAD 345 * which simulates pre-AEAD cipher suites. It needs to be large enough 352 * cipher suites). */ 402 /* tls1_change_cipher_state_cipher performs the work needed to switch cipher 414 const EVP_CIPHER *cipher = s->s3->tmp.new_sym_enc; local 470 EVP_CipherInit_ex(cipher_ctx, cipher, NULL /* engine */, key, iv, !is_read); 493 const EVP_CIPHER *cipher = s->s3->tmp.new_sym_enc; local 511 * cipher suites) the key length reported by 523 key_len = EVP_CIPHER_key_length(cipher); 524 iv_len = EVP_CIPHER_iv_length(cipher); [all...] |
/external/chromium_org/third_party/webrtc/base/ |
H A D | opensslstreamadapter.cc | 44 // SRTP cipher suite table 255 for (std::vector<std::string>::const_iterator cipher = ciphers.begin(); 256 cipher != ciphers.end(); ++cipher) { 260 if (*cipher == entry->external_name) { 270 LOG(LS_ERROR) << "Could not find cipher: " << *cipher; 285 bool OpenSSLStreamAdapter::GetDtlsSrtpCipher(std::string* cipher) { argument 300 *cipher = entry->external_name;
|
H A D | nssstreamadapter.cc | 55 // SRTP cipher suite table 896 for (std::vector<std::string>::const_iterator cipher = ciphers.begin(); 897 cipher != ciphers.end(); ++cipher) { 901 if (*cipher == entry->external_name) { 909 LOG(LS_ERROR) << "Could not find cipher: " << *cipher; 925 bool NSSStreamAdapter::GetDtlsSrtpCipher(std::string* cipher) { argument 940 *cipher = entry->external_name;
|
/external/openssl/apps/ |
H A D | cms.c | 114 const EVP_CIPHER *cipher = NULL; local 204 cipher = EVP_des_ede3_cbc(); 206 cipher = EVP_des_cbc(); 210 cipher = EVP_seed_cbc(); 214 cipher = EVP_rc2_40_cbc(); 216 cipher = EVP_rc2_cbc(); 218 cipher = EVP_rc2_64_cbc(); 222 cipher = EVP_aes_128_cbc(); 224 cipher = EVP_aes_192_cbc(); 226 cipher [all...] |
H A D | req.c | 181 const EVP_CIPHER *cipher=NULL; local 199 cipher=EVP_des_ede3_cbc(); 746 cipher=NULL; 747 if (nodes) cipher=NULL; 751 if (!PEM_write_bio_PrivateKey(out,pkey,cipher,
|
/external/openssl/crypto/threads/ |
H A D | mttest.c | 137 static char *cipher=NULL; variable 272 if (cipher == NULL && OPENSSL_issetugid() == 0) 273 cipher=getenv("SSL_CIPHER");
|
/external/openssl/ssl/ |
H A D | ssl_sess.c | 598 if (ret->cipher == NULL) 607 ret->cipher=ssl_get_cipher_by_char(s,&(buf[2])); 609 ret->cipher=ssl_get_cipher_by_char(s,&(buf[1])); 610 if (ret->cipher == NULL) 927 STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) 926 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) argument
|
H A D | ssl_ciph.c | 113 * ECC cipher suite support in OpenSSL originally developed by 220 const SSL_CIPHER *cipher; member in struct:cipher_order_st 494 c=s->cipher; 811 co_list[co_list_num].cipher = c; 875 *ca_curr = ciph_curr->cipher; 884 * or represent a cipher strength value (will be added in any case because algorithms=0). 966 cp = curr->cipher; 1003 /* add the cipher if it has not been added yet. */ 1013 /* Move the added cipher to this location */ 1073 (curr->cipher 1540 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument 1789 SSL_CIPHER_authentication_method(const SSL_CIPHER* cipher) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.c | 179 struct crypto_cipher *cipher; local 194 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 195 if (cipher == NULL) { 196 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 200 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) { 202 crypto_cipher_deinit(cipher); 205 crypto_cipher_deinit(cipher); 214 struct crypto_cipher *cipher; local 229 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 230 if (cipher [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.c | 179 struct crypto_cipher *cipher; local 194 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 195 if (cipher == NULL) { 196 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 200 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) { 202 crypto_cipher_deinit(cipher); 205 crypto_cipher_deinit(cipher); 214 struct crypto_cipher *cipher; local 229 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 230 if (cipher [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 179 struct crypto_cipher *cipher; local 194 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 195 if (cipher == NULL) { 196 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 200 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) { 202 crypto_cipher_deinit(cipher); 205 crypto_cipher_deinit(cipher); 214 struct crypto_cipher *cipher; local 229 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 230 if (cipher [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
H A D | pkcs8.c | 64 #include <openssl/cipher.h> 211 const EVP_CIPHER *cipher, const EVP_MD *md, 241 iterations, EVP_CIPHER_key_length(cipher), key, md)) { 247 iterations, EVP_CIPHER_iv_length(cipher), iv, md)) { 253 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, is_encrypt); 261 const EVP_CIPHER *cipher, const EVP_MD *md, 288 const EVP_CIPHER *cipher; local 315 cipher = NULL; 317 cipher = suite->cipher_func(); 318 if (!cipher) { 209 pkcs12_pbe_keyivgen(EVP_CIPHER_CTX *ctx, const uint8_t *pass_raw, size_t pass_raw_len, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int is_encrypt) argument 481 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int pass_len, uint8_t *salt, size_t salt_len, int iterations, PKCS8_PRIV_KEY_INFO *p8inf) argument [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | fakesession.h | 244 virtual bool GetSrtpCipher(std::string* cipher) { argument 246 *cipher = chosen_srtp_cipher_;
|
/external/chromium_org/third_party/libsrtp/srtp/srtp/ |
H A D | srtp.c | 118 /* allocate cipher */ 149 * the cipher 201 /* deallocate cipher, if it is not the same as that in template */ 230 * deallocate rtcp cipher, if it is not the same as that in 270 * initializes it using the cipher and auth of the stream_template 291 /* set cipher and auth pointers to those of the template */ 333 * srtp_kdf_init(&kdf, cipher_id, k, keylen) initializes kdf to use cipher 360 cipher_t *cipher; /* cipher used for key derivation */ member in struct:__anon12847 367 stat = crypto_kernel_alloc_cipher(cipher_id, &kdf->cipher, lengt 427 base_key_length(const cipher_type_t *cipher, int key_length) argument [all...] |
/external/openssl/crypto/cms/ |
H A D | cms_lcl.h | 175 const EVP_CIPHER *cipher; member in struct:CMS_EncryptedContentInfo_st 456 const EVP_CIPHER *cipher,
|
/external/openssl/crypto/engine/ |
H A D | eng_cryptodev.c | 101 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 257 sess.cipher = ciphers[i].id; 298 sess.cipher = 0; 377 if ((inl % ctx->cipher->block_size) != 0) 391 if (ctx->cipher->iv_len) { 394 iiv = in + inl - ctx->cipher->iv_len; 395 memcpy(save_iv, iiv, ctx->cipher->iv_len); 407 if (ctx->cipher->iv_len) { 409 iiv = out + inl - ctx->cipher->iv_len; 412 memcpy(ctx->iv, iiv, ctx->cipher 423 int cipher = -1, i; local 609 cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) argument [all...] |
/external/pdfium/core/src/fpdfapi/fpdf_parser/ |
H A D | fpdf_parser_encrypt.cpp | 106 static FX_BOOL _LoadCryptInfo(CPDF_Dictionary* pEncryptDict, FX_BSTR name, int& cipher, int& keylen)
argument 110 cipher = FXCIPHER_RC4;
118 cipher = FXCIPHER_NONE;
139 cipher = FXCIPHER_AES;
170 FX_BOOL CPDF_StandardSecurityHandler::LoadDict(CPDF_Dictionary* pEncryptDict, FX_DWORD type, int& cipher, int& key_len)
argument 185 if (!_LoadCryptInfo(pEncryptDict, strf_name, cipher, key_len)) {
188 m_Cipher = cipher;
193 FX_BOOL CPDF_StandardSecurityHandler::GetCryptInfo(int& cipher, FX_LPCBYTE& buffer, int& keylen)
argument 195 cipher = m_Cipher;
502 int cipher local 884 Init(int cipher, FX_LPCBYTE key, int keylen) argument [all...] |
/external/ppp/pppd/ |
H A D | eap.c | 651 u_char clear[8], cipher[8], dig[SHA_DIGESTSIZE], *optr, *cp; local 780 if (!DesEncrypt(clear, cipher)) { 786 outp += b64enc(&b64, cipher, 8, outp); 788 (void) DesEncrypt(cp, cipher); 789 outp += b64enc(&b64, cipher, 8, outp); 800 (void) DesEncrypt(clear, cipher); 801 outp += b64enc(&b64, cipher, 8, outp);
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 406 static int wpa_cipher_valid_group(int cipher) argument 408 return wpa_cipher_valid_pairwise(cipher) || 409 cipher == WPA_CIPHER_WEP104 || 410 cipher == WPA_CIPHER_WEP40 || 411 cipher == WPA_CIPHER_GTK_NOT_USED; 416 int wpa_cipher_valid_mgmt_group(int cipher) argument 418 return cipher == WPA_CIPHER_AES_128_CMAC || 419 cipher == WPA_CIPHER_BIP_GMAC_128 || 420 cipher == WPA_CIPHER_BIP_GMAC_256 || 421 cipher 936 wpa_cipher_txt(int cipher) argument 1146 wpa_cipher_key_len(int cipher) argument 1171 wpa_cipher_rsc_len(int cipher) argument 1189 wpa_cipher_to_alg(int cipher) argument 1218 wpa_cipher_valid_pairwise(int cipher) argument 1228 wpa_cipher_to_suite(int proto, int cipher) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_openssl.c | 365 const EVP_CIPHER *cipher; local 374 cipher = EVP_rc4(); 381 cipher = EVP_aes_128_cbc(); 385 cipher = EVP_aes_192_cbc(); 389 cipher = EVP_aes_256_cbc(); 399 cipher = EVP_des_ede3_cbc(); 402 cipher = EVP_des_cbc(); 407 cipher = EVP_rc2_ecb(); 417 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) || 427 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NUL [all...] |