/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto.h | 200 * @iv: Initialization vector for block ciphers or %NULL for stream ciphers
|
tls.h | 398 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 404 u8 *ciphers);
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/ |
BufferedBlockCipher.java | 5 * A wrapper class that allows block ciphers to be used to process data in
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/paddings/ |
PaddedBufferedBlockCipher.java | 11 * A wrapper class that allows block ciphers to be used to process data in
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/jce/provider/ |
JCEStreamCipher.java | 373 * The ciphers that inherit from us.
|
BrokenJCEBlockCipher.java | 548 * The ciphers that inherit from us.
|
/external/dropbear/libtomcrypt/src/ciphers/ |
xtea.c | 209 /* $Source: /cvs/libtom/libtomcrypt/src/ciphers/xtea.c,v $ */
|
noekeon.c | 301 /* $Source: /cvs/libtom/libtomcrypt/src/ciphers/noekeon.c,v $ */
|
rc5.c | 320 /* $Source: /cvs/libtom/libtomcrypt/src/ciphers/rc5.c,v $ */
|
/external/ipsec-tools/ |
NEWS | 88 o Ciphers are now used through the 'EVP' interface which allows
|
/external/openssl/apps/ |
progs.h | 125 {FUNC_TYPE_GENERAL,"ciphers",ciphers_main},
|
s_client.c | 233 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n"); 251 BIO_printf(bio_err," -cutthrough - enable 1-RTT full-handshake for strong ciphers\n"); 733 * strong ciphers. */ [all...] |
/external/openssl/crypto/engine/ |
eng_int.h | 160 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
|
eng_lib.c | 93 e->ciphers = NULL;
|
/dalvik/libcore/crypto/src/main/java/javax/crypto/ |
CipherSpi.java | 33 * cryptographic ciphers. 35 * Implementers of cryptographic ciphers must implement all the abstract methods 37 * along with ciphers when the {@link Cipher#getInstance} method is called. A
|
/external/dropbear/ |
configure.in | 622 AS_MKDIR_P(libtomcrypt/src/ciphers/aes) 623 AS_MKDIR_P(libtomcrypt/src/ciphers/safer) 624 AS_MKDIR_P(libtomcrypt/src/ciphers/twofish)
|
/external/wpa_supplicant/ |
config_ssid.h | 166 * pairwise_cipher - Bitfield of allowed pairwise ciphers, WPA_CIPHER_* 171 * group_cipher - Bitfield of allowed group ciphers, WPA_CIPHER_* 350 * ciphers with DSA keys always use ephemeral DH keys. This can be used
|
tls.h | 390 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 395 u8 *ciphers);
|
/external/dropbear/libtomcrypt/testprof/ |
x86_prof.c | 264 fprintf(stderr, "\n\nKey Schedule Time Trials for the Symmetric Ciphers:\n(Times are cycles per key)\n"); 299 fprintf(stderr, "\n\nECB Time Trials for the Symmetric Ciphers:\n"); 371 fprintf(stderr, "\n\nCBC Time Trials for the Symmetric Ciphers:\n"); 446 fprintf(stderr, "\n\nCTR Time Trials for the Symmetric Ciphers:\n"); 521 fprintf(stderr, "\n\nLRW Time Trials for the Symmetric Ciphers:\n"); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_supplicant.conf | 280 # pairwise: list of accepted pairwise (unicast) ciphers for WPA 287 # group: list of accepted group (broadcast/multicast) ciphers for WPA 412 # setup RSA to use ephemeral DH key exchange. In addition, ciphers with 511 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers 637 # and all valid ciphers.
|
/external/openssl/ssl/ |
ssl_locl.h | 243 * This bits are used packed as dense as possible. If new methods/ciphers 319 * and ciphers goes, another extension to SSL_SUPER and/or SSL_ULTRA would 340 * Macros to check the export status and cipher strength for export ciphers. [all...] |
d1_lib.c | 241 * As it's impossible to use stream ciphers in "datagram" mode, this
|
/external/openssl/crypto/evp/ |
evp_test.c | 354 /* Register all available ENGINE implementations of ciphers and digests.
|
openbsd_hw.c | 188 /* NB: this can only make cinl != inl with stream ciphers */
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_record.c | 33 * currently used ciphers.
|