HomeSort by relevance Sort by last modified time
    Searched full:ciphers (Results 51 - 75 of 216) sorted by null

1 23 4 5 6 7 8 9

  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_supplicant.conf.sgml 51 # home network; allow all valid ciphers
59 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
  /external/boringssl/src/include/openssl/
cipher.h 67 /* Ciphers. */
201 * still updated. For CBC-mode ciphers, the IV is updated to the final
202 * ciphertext block. For stream ciphers, the stream is advanced past the bytes
210 * TODO(davidben): The normal ciphers currently never fail, even if, e.g.,
283 * valid for ciphers that can take a variable length key. It returns one on
414 /* EVP_CIPH_NO_PADDING disables padding in block ciphers. */
ssl.h 552 /* SSL_OP_CIPHER_SERVER_PREFERENCE configures servers to select ciphers and
3462 STACK_OF(SSL_CIPHER) *ciphers; member in struct:ssl_cipher_preference_list_st
    [all...]
tls1.h 286 * s3_lib.c). We actually treat them like SSL 3.0 ciphers, which we probably
444 * The OpenSSL names of ciphers with ephemeral DH here include the string
446 * (The alias for the list of all such ciphers also is "EDH".)
602 /* For convenience, the old and new CHACHA20_POLY1305 ciphers have the same
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.c 480 int ciphers, key_mgmt, res, version; local
618 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
620 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
621 if (!ciphers) {
637 if (ciphers & WPA_CIPHER_TKIP) {
674 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
  /libcore/ojluni/src/main/java/sun/security/ssl/
CipherBox.java 48 * message. This provides data confidentiality. Stream ciphers (such
49 * as RC4) don't need to do padding; block ciphers (e.g. DES) need it.
54 * In RFC 2246, with bock ciphers in CBC mode, the Initialization
106 * Cipher blocksize, 0 for stream ciphers
383 * For SSLv3 and TLSv1.0, with block ciphers in CBC mode the
761 * For PKCS11 ciphers, this will release any attached sessions, and
  /external/boringssl/src/ssl/
s3_srvr.c 736 /* Skip SSLv2 ciphers. */
772 STACK_OF(SSL_CIPHER) *ciphers = NULL;
    [all...]
  /external/webrtc/webrtc/base/
sslstreamadapter_unittest.cc 463 void SetDtlsSrtpCryptoSuites(const std::vector<int>& ciphers, bool client) {
465 client_ssl_->SetDtlsSrtpCryptoSuites(ciphers);
467 server_ssl_->SetDtlsSrtpCryptoSuites(ciphers);
907 // Test DTLS-SRTP with all high ciphers
925 // Test DTLS-SRTP with all low ciphers
    [all...]
opensslstreamadapter.cc 414 const std::vector<int>& ciphers) {
421 for (std::vector<int>::const_iterator cipher = ciphers.begin();
422 cipher != ciphers.end(); ++cipher) {
788 // Specify an ECDH group for ECDHE ciphers, otherwise they cannot be
1008 // Select list of available ciphers. Note that !SHA256 and !SHA384 only
    [all...]
opensslstreamadapter.h 201 // The DtlsSrtp ciphers
  /cts/tests/tests/keystore/src/android/keystore/cts/
BlockCipherTestBase.java 177 // Authenticated ciphers do not return any output when decrypting until doFinal where
190 // Unauthenticated stream ciphers do not buffer input or output.
243 // Unauthenticated stream ciphers do not buffer input or output.
264 // Non-stream authenticated ciphers not supported
635 // Stream ciphers always produce output for non-empty input.
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_fast.c 1445 u8 ciphers[7]; local
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_internal.c 633 u8 *ciphers)
637 return tlsv1_client_set_cipher_list(conn->client, ciphers);
641 return tlsv1_server_set_cipher_list(conn->server, ciphers);
  /external/boringssl/src/crypto/cipher/
cipher_test.cc 151 // The ciphers are run with no padding. For each of the ciphers we test, the
e_ssl3.c 42 * length for legacy ciphers. */
267 * ciphers are already broken. Support will be removed eventually.
  /external/srtp/
Makefile.in 77 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \
98 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(replay)
srtp7.vcproj 143 Name="Ciphers">
  /external/webrtc/webrtc/p2p/base/
p2ptransportchannel.h 122 // Set up the ciphers to use for DTLS-SRTP.
123 bool SetSrtpCryptoSuites(const std::vector<int>& ciphers) override {
  /external/nist-sip/java/gov/nist/javax/sip/
SipStackExt.java 119 * @param newCipherSuites -- The new set of ciphers to support.
  /external/okhttp/benchmarks/src/main/java/com/squareup/okhttp/benchmarks/
Benchmark.java 64 // TODO: compare different ciphers?
  /external/srtp/crypto/include/
crypto_kernel.h 154 * running tests on the ciphers, auth funcs, and rng, and prints out a
crypto_types.h 72 * @defgroup Ciphers Cipher Types
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.c 758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers)
768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
tlsv1_server.c 655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers)
665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
  /libcore/ojluni/src/main/java/javax/crypto/spec/
GCMParameterSpec.java 43 * (Additional Authenticated Data (AAD), Keys, block ciphers,

Completed in 660 milliseconds

1 23 4 5 6 7 8 9