/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
ssl.py | 95 # Disable weak or insecure ciphers by default 110 suppress_ragged_eofs=True, ciphers=None): 121 if ciphers is None and ssl_version != _SSLv2_IF_EXISTS: 122 ciphers = _DEFAULT_CIPHERS 141 ciphers) 149 self.ciphers = ciphers 314 self.ca_certs, self.ciphers) 355 ciphers=self.ciphers, [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
ssl.py | 95 # Disable weak or insecure ciphers by default 110 suppress_ragged_eofs=True, ciphers=None): 121 if ciphers is None and ssl_version != _SSLv2_IF_EXISTS: 122 ciphers = _DEFAULT_CIPHERS 141 ciphers) 149 self.ciphers = ciphers 314 self.ca_certs, self.ciphers) 355 ciphers=self.ciphers, [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | [all...] |
wpa_common.h | 441 int rsn_cipher_put_suites(u8 *pos, int ciphers); 442 int wpa_cipher_put_suites(u8 *pos, int ciphers); 443 int wpa_pick_pairwise_cipher(int ciphers, int none_allowed); 444 int wpa_pick_group_cipher(int ciphers); 446 int wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.h | 41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
|
tlsv1_server.h | 37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
|
tlsv1_client.c | 759 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 763 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) 769 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/external/srtp/crypto/ |
Makefile | 69 ciphers = cipher/cipher.o cipher/null_cipher.o \ macro 87 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(xfm)
|
/external/boringssl/src/ssl/ |
ssl_test.cc | 36 // The list of expected ciphers, in order, terminated with -1. 40 // Selecting individual ciphers should work. 55 // + reorders selected ciphers to the end, keeping their relative 72 // ! banishes ciphers from future selections. 94 // - removes selected ciphers, but preserves their order for future 139 // ciphers and only the selected ciphers. 144 // Order some ciphers backwards by strength. 164 // Exact ciphers may not be used in multi-part rules; they are treated 217 for (size_t i = 0; i < sk_SSL_CIPHER_num(list->ciphers); i++) [all...] |
ssl_lib.c | 454 sk_SSL_CIPHER_free(cipher_list->ciphers); 462 size_t n = sk_SSL_CIPHER_num(cipher_list->ciphers); 469 ret->ciphers = NULL; 471 ret->ciphers = sk_SSL_CIPHER_dup(cipher_list->ciphers); 472 if (!ret->ciphers) { 488 STACK_OF(SSL_CIPHER) *ciphers) { 490 size_t n = sk_SSL_CIPHER_num(ciphers); 496 ret->ciphers = NULL; 498 ret->ciphers = sk_SSL_CIPHER_dup(ciphers) [all...] |
s3_srvr.c | 776 /* Skip SSLv2 ciphers. */ 813 STACK_OF(SSL_CIPHER) *ciphers = NULL; [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_none.c | 137 u8 *ciphers)
|
tls_internal.c | 606 u8 *ciphers) 610 return tlsv1_client_set_cipher_list(conn->client, ciphers); 614 return tlsv1_server_set_cipher_list(conn->server, ciphers);
|
tls.h | 460 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 466 u8 *ciphers);
|
tls_openssl.c | 740 const char *ciphers; local 834 ciphers = conf->openssl_ciphers; 836 ciphers = "DEFAULT:!EXP:!LOW"; 837 if (SSL_CTX_set_cipher_list(ssl, ciphers) != 1) { 840 ciphers); [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_ssl.py | 171 cert_reqs=ssl.CERT_NONE, ciphers="ALL") 174 cert_reqs=ssl.CERT_NONE, ciphers="DEFAULT") 179 cert_reqs=ssl.CERT_NONE, ciphers="^$:,;?*'dorothyx") 443 ciphers=self.server.ciphers) 530 wrap_accepting_socket=False, ciphers=None): 540 self.ciphers = ciphers 552 ciphers = self.ciphers) [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_ssl.py | 171 cert_reqs=ssl.CERT_NONE, ciphers="ALL") 174 cert_reqs=ssl.CERT_NONE, ciphers="DEFAULT") 179 cert_reqs=ssl.CERT_NONE, ciphers="^$:,;?*'dorothyx") 443 ciphers=self.server.ciphers) 530 wrap_accepting_socket=False, ciphers=None): 540 self.ciphers = ciphers 552 ciphers = self.ciphers) [all...] |
/external/openssh/ |
readconf.h | 73 char *ciphers; /* SSH2 ciphers in order of preference. */ member in struct:__anon17325
|
cipher.c | 80 static const struct sshcipher ciphers[] = { variable in typeref:struct:sshcipher 128 /* Returns a comma-separated list of supported ciphers. */ 136 for (c = ciphers; c->name != NULL; c++) { 220 for (c = ciphers; c->name != NULL; c++) 230 for (c = ciphers; c->name != NULL; c++) 271 for (c = ciphers; c->name != NULL; c++)
|
servconf.h | 91 char *ciphers; /* Supported SSH2 ciphers. */ member in struct:__anon17334
|
/external/srtp/ |
Makefile | 75 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \ macro 96 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(replay)
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.c | 462 int ciphers, key_mgmt, res, version; local 600 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 602 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 603 if (!ciphers) { 619 if (ciphers & WPA_CIPHER_TKIP) { 656 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/external/libvncserver/webclients/java-applet/ssl/ |
ss_vncviewer | 212 ciphers="" 276 "-anondh") ciphers="ciphers=$anondh" 281 "-ciphers") shift; ciphers="ciphers=$1" [all...] |
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/ |
ss_vncviewer | 212 ciphers="" 276 "-anondh") ciphers="ciphers=$anondh" 281 "-ciphers") shift; ciphers="ciphers=$1" [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast.c | 1446 u8 ciphers[5]; local [all...] |