HomeSort by relevance Sort by last modified time
    Searched full:ciphers (Results 26 - 50 of 165) sorted by null

12 3 4 5 6 7

  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_none.c 151 u8 *ciphers)
tls_internal.c 435 u8 *ciphers)
439 return tlsv1_client_set_cipher_list(conn->client, ciphers);
443 return tlsv1_server_set_cipher_list(conn->server, ciphers);
  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/engines/
IESEngine.java 17 * support class for constructing intergrated encryption ciphers
18 * for doing basic message exchanges on top of key agreement ciphers
  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/modes/
CTSBlockCipher.java 9 * A Cipher Text Stealing (CTS) mode cipher. CTS allows block ciphers to
27 throw new IllegalArgumentException("CTSBlockCipher can only accept ECB, or CBC ciphers");
  /dalvik/libcore/x-net/src/main/java/org/apache/harmony/xnet/provider/jsse/
ConnectionState.java 70 // block ciphers return value with padding included
85 * For stream ciphers the returned value will be exact value.
OpenSSLServerSocketImpl.java 189 * Gets all available ciphers from the current OpenSSL library.
209 * @throws IllegalArgumentException when one or more of the ciphers in array
  /external/dropbear/libtomcrypt/src/ciphers/safer/
safer_tab.c 14 Tables for SAFER block ciphers
66 /* $Source: /cvs/libtom/libtomcrypt/src/ciphers/safer/safer_tab.c,v $ */
  /external/openssl/ssl/
s23_lib.c 96 /* This function needs to check if the ciphers required are actually
120 /* We can write SSLv2 and SSLv3 ciphers */
s2_srvr.c 640 &s->session->ciphers);
666 sk_SSL_CIPHER_free(s->session->ciphers);
667 s->session->ciphers = prio;
669 /* s->session->ciphers should now have a list of
670 * ciphers that are on both the client and server.
672 * the ciphers or in the order of the server's preference
766 s2n(0,p); /* ciphers len */
779 /* lets send out the ciphers we like in the
781 sk= s->session->ciphers;
782 n=ssl_cipher_list_to_bytes(s,s->session->ciphers,d,0)
    [all...]
ssl_ciph.c 172 /* Don't include ECC in ALL because these ciphers are not yet official. */
515 /* Get the initial list of ciphers */
516 co_list_num = 0; /* actual count of ciphers */
571 * First, add the real ciphers as already collected
730 * This routine sorts the ciphers with descending strength. The sorting
975 * in algorithms, so we first get the mask of disabled ciphers.
985 * Now we have to collect the available ciphers from the compiled
986 * in ciphers. We cannot get more than the number compiled in, so
991 printf("ssl_create_cipher_list() for %d ciphers\n", num_of_ciphers);
1006 * of ciphers themselves 2) aliases for groups of ciphers
    [all...]
s3_srvr.c 739 STACK_OF(SSL_CIPHER) *ciphers=NULL;
901 if ((i > 0) && (ssl_bytes_to_cipher_list(s,p,i,&(ciphers))
915 printf("client sent %d ciphers\n",sk_num(ciphers));
917 for (i=0; i<sk_SSL_CIPHER_num(ciphers); i++)
919 c=sk_SSL_CIPHER_value(ciphers,i);
922 i,sk_num(ciphers),SSL_CIPHER_get_name(c));
930 if (j == 0 && (s->options & SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG) && (sk_SSL_CIPHER_num(ciphers) == 1))
937 c = sk_SSL_CIPHER_value(ciphers, 0);
1042 /* Given s->session->ciphers and SSL_get_ciphers, we mus
    [all...]
ssl_err.c 362 {ERR_REASON(SSL_R_LIBRARY_HAS_NO_CIPHERS),"library has no ciphers"},
384 {ERR_REASON(SSL_R_NO_CIPHERS_AVAILABLE) ,"no ciphers available"},
385 {ERR_REASON(SSL_R_NO_CIPHERS_PASSED) ,"no ciphers passed"},
386 {ERR_REASON(SSL_R_NO_CIPHERS_SPECIFIED) ,"no ciphers specified"},
456 {ERR_REASON(SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS),"ssl library has no ciphers"},
    [all...]
s23_clnt.c 301 /* Ciphers supported */
305 /* no ciphers */
363 /* Ciphers supported (using SSL 3.0/TLS 1.0 format) */
  /external/wpa_supplicant/
tls_internal.c 243 u8 *ciphers)
245 return tlsv1_client_set_cipher_list(conn->client, ciphers);
tls_none.c 158 u8 *ciphers)
  /external/openssl/apps/
Makefile 41 s_time version pkcs7 cms crl2pkcs7 sess_id ciphers nseq pkcs12 \
58 ciphers.o nseq.o pkcs12.o pkcs8.o spkac.o smime.o rand.o engine.o \
66 ciphers.c nseq.c pkcs12.c pkcs8.c spkac.c smime.c rand.c engine.c \
241 ciphers.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
242 ciphers.o: ../include/openssl/bn.h ../include/openssl/buffer.h
243 ciphers.o: ../include/openssl/comp.h ../include/openssl/conf.h
244 ciphers.o: ../include/openssl/crypto.h ../include/openssl/dtls1.h
245 ciphers.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
246 ciphers.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
247 ciphers.o: ../include/openssl/engine.h ../include/openssl/err.
    [all...]
  /external/dropbear/
filelist.txt 14 algo.c Framework for handling various ciphers/hashes/algos,
  /external/dropbear/libtomcrypt/src/mac/pelican/
pelican.c 22 #include "../../ciphers/aes/aes_tab.c"
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_client.c 602 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
606 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers)
613 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
tlsv1_server.c 543 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
547 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers)
554 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
  /frameworks/base/wifi/java/android/net/wifi/
WifiConfiguration.java 147 * Recognized pairwise ciphers for WPA.
165 * Recognized group ciphers.
285 * The set of pairwise ciphers for WPA supported by this configuration.
291 * The set of group ciphers supported by this configuration.
  /system/core/nexus/
WifiNetwork.h 269 * The set of pairwise ciphers for WPA supported by this configuration.
274 * The set of group ciphers for WPA supported by this configuration.
  /external/dropbear/libtomcrypt/demos/
tv_gen.c 300 /* skip ciphers which do not have 64 or 128 bit block sizes */
355 /* skip ciphers which do not have 64 or 128 bit block sizes */
409 /* skip ciphers which do not have 64 or 128 bit block sizes */
469 /* skip ciphers which do not have 64 or 128 bit block sizes */
533 /* skip ciphers which do not have 128 bit block sizes */
595 /* skip ciphers which do not have 128 bit block sizes */
  /external/openssl/include/openssl/
tls1.h 192 * s3_lib.c). We actually treat them like SSL 3.0 ciphers, which we probably
274 * The OpenSSL names of ciphers with ephemeral DH here include the string
276 * (The alias for the list of all such ciphers also is "EDH".)
  /external/openssl/patches/
handshake_cutthrough.patch 8 + BIO_printf(bio_err," -cutthrough - enable 1-RTT full-handshake for strong ciphers\n");
34 + * strong ciphers. */
227 + fprintf(stderr," -cutthrough - enable 1-RTT full-handshake for strong ciphers\n");

Completed in 282 milliseconds

12 3 4 5 6 7