HomeSort by relevance Sort by last modified time
    Searched full:ciphers (Results 51 - 75 of 165) sorted by null

1 23 4 5 6 7

  /external/openssl/ssl/
tls1.h 192 * s3_lib.c). We actually treat them like SSL 3.0 ciphers, which we probably
274 * The OpenSSL names of ciphers with ephemeral DH here include the string
276 * (The alias for the list of all such ciphers also is "EDH".)
s2_lib.c 70 /* list of available SSLv2 ciphers (sorted by id) */
338 /* This function needs to check if the ciphers required are actually
ssl_algs.c 114 /* If you want support for phased out ciphers, add the following */
s3_lib.c 139 /* list of available SSLv3 ciphers (sorted by id) */
141 /* The RSA ciphers */
274 /* The DH ciphers */
354 /* The Ephemeral DH ciphers */
545 /* The Kerberos ciphers */
    [all...]
s2_clnt.c 454 /* We have just received a list of ciphers back from the
458 /* load the ciphers */
460 &s->session->ciphers);
471 /* get the array of ciphers we will accept */
490 /* In theory we could have ciphers sent back that we
ssl.h 206 /* text strings for the ciphers */
251 /* These are used to specify which ciphers to use and not to use */
304 * ciphers normally not being used.
305 * Example: "RC4" will activate all ciphers using RC4 including ciphers
348 /* used to hold info on the particular ciphers used */
354 unsigned long algorithms; /* what ciphers are used */
469 STACK_OF(SSL_CIPHER) *ciphers; /* shared ciphers? */ member in struct:ssl_session_st
    [all...]
ssl_lib.c 1147 /** return a STACK of the ciphers available for the SSL and in order of
1166 /** return a STACK of the ciphers available for the SSL and in order of
1200 /** specify the ciphers to be used by default by the SSL_CTX */
1224 /** specify the ciphers to be used by the SSL */
1250 if ((s->session == NULL) || (s->session->ciphers == NULL) ||
1255 sk=s->session->ciphers;
    [all...]
  /external/dropbear/libtomcrypt/
changes 145 ++ re-released as the rsa fix was incorrect (bad John bad ... hehehe) and I missed some NULLs in the static descriptor entry for ciphers
156 -- cleaned up ciphers definitions to remove cbc/cfb/ofb/ctr/etc from the namespace when not used.
254 -- Users may want to note that on a P4/GCC3.4 platform "-fno-regmove" greatly accelerates the ciphers/hashes.
364 -- Added "done" function to ciphers and the five chaining modes [and things like omac/pmac/etc]
    [all...]
crypt.tex 120 designing cryptosystems. It supports symmetric ciphers, one-way hashes, pseudo-random number generators,
123 The library was designed such that new ciphers/hashes/PRNGs can be added at run-time and the existing API
146 With this library all core functions (ciphers, hashes, prngs, and bignum) have the same prototype definition. They all load
150 that can be used to make a program automatically pick between ciphers, hashes and PRNGs at run-time. That means your
151 application can support all ciphers/hashes/prngs/bignum without changing the source code.
165 The LibTomCrypt package has also been written to be very modular. The block ciphers, one--way hashes,
182 are not directly tied to the ciphers. That is a new cipher can be added to the library by simply providing
193 of the authors knowledge the only patent related issues within the library are the RC5 and RC6 symmetric block ciphers.
195 of the ciphers and hashes are patent free or under patents that have since expired.
197 The RC2 and RC4 symmetric ciphers are not under patents but are under trademark regulations. This means you can use
    [all...]
  /dalvik/libcore/crypto/src/main/java/javax/crypto/
SealedObject.java 82 * the serialized data is not a multiple of the ciphers block
209 * the serialized data is not a multiple of the ciphers block
  /external/openssl/crypto/engine/
eng_list.c 337 dest->ciphers = src->ciphers;
eng_fat.c 114 else if (!strncmp(alg, "CIPHERS", len))
  /external/wpa_supplicant_6/wpa_supplicant/
config_ssid.h 140 * pairwise_cipher - Bitfield of allowed pairwise ciphers, WPA_CIPHER_*
145 * group_cipher - Bitfield of allowed group ciphers, WPA_CIPHER_*
  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/modes/
GOFBBlockCipher.java 42 throw new IllegalArgumentException("GTCR only for 64 bit block ciphers");
PaddedBlockCipher.java 9 * A wrapper class that allows block ciphers to be used to process data in
  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/util/
PublicKeyFactory.java 44 * Factory to create asymmetric public key parameters for asymmetric ciphers
  /external/dropbear/
INSTALL 47 you should remove unneeded ciphers and MD5, by editing options.h
  /external/dropbear/libtomcrypt/notes/
tech0004.txt 66 SOBER-128 is actually a stream cipher but like most ciphers can easily be modelled in the context of a PRNG.
  /external/dropbear/libtomcrypt/src/misc/crypt/
crypt.c 47 "Ciphers built-in:\n"
  /external/openssl/apps/
progs.pl 30 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_fast.c 1409 u8 ciphers[5]; local
    [all...]
  /external/wpa_supplicant/
wpa_supplicant.conf 223 # pairwise: list of accepted pairwise (unicast) ciphers for WPA
230 # group: list of accepted group (broadcast/multicast) ciphers for WPA
343 # setup RSA to use ephemeral DH key exchange. In addition, ciphers with
439 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers
554 # and all valid ciphers.
crypto.h 199 * @iv: Initialization vector for block ciphers or %NULL for stream ciphers
  /external/openssl/include/openssl/
ssl.h 206 /* text strings for the ciphers */
251 /* These are used to specify which ciphers to use and not to use */
304 * ciphers normally not being used.
305 * Example: "RC4" will activate all ciphers using RC4 including ciphers
348 /* used to hold info on the particular ciphers used */
354 unsigned long algorithms; /* what ciphers are used */
469 STACK_OF(SSL_CIPHER) *ciphers; /* shared ciphers? */ member in struct:ssl_session_st
    [all...]
  /dalvik/libcore/x-net/src/main/java/org/apache/harmony/xnet/provider/jsse/
ConnectionStateTLS.java 276 // "For stream ciphers that do not use a synchronization
279 // and for block ciphers:

Completed in 346 milliseconds

1 23 4 5 6 7