/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_none.c | 151 u8 *ciphers)
|
tls_internal.c | 435 u8 *ciphers) 439 return tlsv1_client_set_cipher_list(conn->client, ciphers); 443 return tlsv1_server_set_cipher_list(conn->server, ciphers);
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/engines/ |
IESEngine.java | 17 * support class for constructing intergrated encryption ciphers 18 * for doing basic message exchanges on top of key agreement ciphers
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/modes/ |
CTSBlockCipher.java | 9 * A Cipher Text Stealing (CTS) mode cipher. CTS allows block ciphers to 27 throw new IllegalArgumentException("CTSBlockCipher can only accept ECB, or CBC ciphers");
|
/dalvik/libcore/x-net/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ConnectionState.java | 70 // block ciphers return value with padding included 85 * For stream ciphers the returned value will be exact value.
|
OpenSSLServerSocketImpl.java | 189 * Gets all available ciphers from the current OpenSSL library. 209 * @throws IllegalArgumentException when one or more of the ciphers in array
|
/external/dropbear/libtomcrypt/src/ciphers/safer/ |
safer_tab.c | 14 Tables for SAFER block ciphers 66 /* $Source: /cvs/libtom/libtomcrypt/src/ciphers/safer/safer_tab.c,v $ */
|
/external/openssl/ssl/ |
s23_lib.c | 96 /* This function needs to check if the ciphers required are actually 120 /* We can write SSLv2 and SSLv3 ciphers */
|
s2_srvr.c | 640 &s->session->ciphers); 666 sk_SSL_CIPHER_free(s->session->ciphers); 667 s->session->ciphers = prio; 669 /* s->session->ciphers should now have a list of 670 * ciphers that are on both the client and server. 672 * the ciphers or in the order of the server's preference 766 s2n(0,p); /* ciphers len */ 779 /* lets send out the ciphers we like in the 781 sk= s->session->ciphers; 782 n=ssl_cipher_list_to_bytes(s,s->session->ciphers,d,0) [all...] |
ssl_ciph.c | 172 /* Don't include ECC in ALL because these ciphers are not yet official. */ 515 /* Get the initial list of ciphers */ 516 co_list_num = 0; /* actual count of ciphers */ 571 * First, add the real ciphers as already collected 730 * This routine sorts the ciphers with descending strength. The sorting 975 * in algorithms, so we first get the mask of disabled ciphers. 985 * Now we have to collect the available ciphers from the compiled 986 * in ciphers. We cannot get more than the number compiled in, so 991 printf("ssl_create_cipher_list() for %d ciphers\n", num_of_ciphers); 1006 * of ciphers themselves 2) aliases for groups of ciphers [all...] |
s3_srvr.c | 739 STACK_OF(SSL_CIPHER) *ciphers=NULL; 901 if ((i > 0) && (ssl_bytes_to_cipher_list(s,p,i,&(ciphers)) 915 printf("client sent %d ciphers\n",sk_num(ciphers)); 917 for (i=0; i<sk_SSL_CIPHER_num(ciphers); i++) 919 c=sk_SSL_CIPHER_value(ciphers,i); 922 i,sk_num(ciphers),SSL_CIPHER_get_name(c)); 930 if (j == 0 && (s->options & SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG) && (sk_SSL_CIPHER_num(ciphers) == 1)) 937 c = sk_SSL_CIPHER_value(ciphers, 0); 1042 /* Given s->session->ciphers and SSL_get_ciphers, we mus [all...] |
ssl_err.c | 362 {ERR_REASON(SSL_R_LIBRARY_HAS_NO_CIPHERS),"library has no ciphers"}, 384 {ERR_REASON(SSL_R_NO_CIPHERS_AVAILABLE) ,"no ciphers available"}, 385 {ERR_REASON(SSL_R_NO_CIPHERS_PASSED) ,"no ciphers passed"}, 386 {ERR_REASON(SSL_R_NO_CIPHERS_SPECIFIED) ,"no ciphers specified"}, 456 {ERR_REASON(SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS),"ssl library has no ciphers"}, [all...] |
s23_clnt.c | 301 /* Ciphers supported */ 305 /* no ciphers */ 363 /* Ciphers supported (using SSL 3.0/TLS 1.0 format) */
|
/external/wpa_supplicant/ |
tls_internal.c | 243 u8 *ciphers) 245 return tlsv1_client_set_cipher_list(conn->client, ciphers);
|
tls_none.c | 158 u8 *ciphers)
|
/external/openssl/apps/ |
Makefile | 41 s_time version pkcs7 cms crl2pkcs7 sess_id ciphers nseq pkcs12 \ 58 ciphers.o nseq.o pkcs12.o pkcs8.o spkac.o smime.o rand.o engine.o \ 66 ciphers.c nseq.c pkcs12.c pkcs8.c spkac.c smime.c rand.c engine.c \ 241 ciphers.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h 242 ciphers.o: ../include/openssl/bn.h ../include/openssl/buffer.h 243 ciphers.o: ../include/openssl/comp.h ../include/openssl/conf.h 244 ciphers.o: ../include/openssl/crypto.h ../include/openssl/dtls1.h 245 ciphers.o: ../include/openssl/e_os2.h ../include/openssl/ec.h 246 ciphers.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h 247 ciphers.o: ../include/openssl/engine.h ../include/openssl/err. [all...] |
/external/dropbear/ |
filelist.txt | 14 algo.c Framework for handling various ciphers/hashes/algos,
|
/external/dropbear/libtomcrypt/src/mac/pelican/ |
pelican.c | 22 #include "../../ciphers/aes/aes_tab.c"
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client.c | 602 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 606 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) 613 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
tlsv1_server.c | 543 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 547 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) 554 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/frameworks/base/wifi/java/android/net/wifi/ |
WifiConfiguration.java | 147 * Recognized pairwise ciphers for WPA. 165 * Recognized group ciphers. 285 * The set of pairwise ciphers for WPA supported by this configuration. 291 * The set of group ciphers supported by this configuration.
|
/system/core/nexus/ |
WifiNetwork.h | 269 * The set of pairwise ciphers for WPA supported by this configuration. 274 * The set of group ciphers for WPA supported by this configuration.
|
/external/dropbear/libtomcrypt/demos/ |
tv_gen.c | 300 /* skip ciphers which do not have 64 or 128 bit block sizes */ 355 /* skip ciphers which do not have 64 or 128 bit block sizes */ 409 /* skip ciphers which do not have 64 or 128 bit block sizes */ 469 /* skip ciphers which do not have 64 or 128 bit block sizes */ 533 /* skip ciphers which do not have 128 bit block sizes */ 595 /* skip ciphers which do not have 128 bit block sizes */
|
/external/openssl/include/openssl/ |
tls1.h | 192 * s3_lib.c). We actually treat them like SSL 3.0 ciphers, which we probably 274 * The OpenSSL names of ciphers with ephemeral DH here include the string 276 * (The alias for the list of all such ciphers also is "EDH".)
|
/external/openssl/patches/ |
handshake_cutthrough.patch | 8 + BIO_printf(bio_err," -cutthrough - enable 1-RTT full-handshake for strong ciphers\n"); 34 + * strong ciphers. */ 227 + fprintf(stderr," -cutthrough - enable 1-RTT full-handshake for strong ciphers\n");
|