/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.conf.sgml | 51 # home network; allow all valid ciphers 59 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
|
/external/boringssl/src/include/openssl/ |
cipher.h | 67 /* Ciphers. */ 201 * still updated. For CBC-mode ciphers, the IV is updated to the final 202 * ciphertext block. For stream ciphers, the stream is advanced past the bytes 210 * TODO(davidben): The normal ciphers currently never fail, even if, e.g., 283 * valid for ciphers that can take a variable length key. It returns one on 414 /* EVP_CIPH_NO_PADDING disables padding in block ciphers. */
|
ssl.h | 552 /* SSL_OP_CIPHER_SERVER_PREFERENCE configures servers to select ciphers and 3462 STACK_OF(SSL_CIPHER) *ciphers; member in struct:ssl_cipher_preference_list_st [all...] |
tls1.h | 286 * s3_lib.c). We actually treat them like SSL 3.0 ciphers, which we probably 444 * The OpenSSL names of ciphers with ephemeral DH here include the string 446 * (The alias for the list of all such ciphers also is "EDH".) 602 /* For convenience, the old and new CHACHA20_POLY1305 ciphers have the same
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.c | 480 int ciphers, key_mgmt, res, version; local 618 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 620 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 621 if (!ciphers) { 637 if (ciphers & WPA_CIPHER_TKIP) { 674 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/libcore/ojluni/src/main/java/sun/security/ssl/ |
CipherBox.java | 48 * message. This provides data confidentiality. Stream ciphers (such 49 * as RC4) don't need to do padding; block ciphers (e.g. DES) need it. 54 * In RFC 2246, with bock ciphers in CBC mode, the Initialization 106 * Cipher blocksize, 0 for stream ciphers 383 * For SSLv3 and TLSv1.0, with block ciphers in CBC mode the 761 * For PKCS11 ciphers, this will release any attached sessions, and
|
/external/boringssl/src/ssl/ |
s3_srvr.c | 736 /* Skip SSLv2 ciphers. */ 772 STACK_OF(SSL_CIPHER) *ciphers = NULL; [all...] |
/external/webrtc/webrtc/base/ |
sslstreamadapter_unittest.cc | 463 void SetDtlsSrtpCryptoSuites(const std::vector<int>& ciphers, bool client) { 465 client_ssl_->SetDtlsSrtpCryptoSuites(ciphers); 467 server_ssl_->SetDtlsSrtpCryptoSuites(ciphers); 907 // Test DTLS-SRTP with all high ciphers 925 // Test DTLS-SRTP with all low ciphers [all...] |
opensslstreamadapter.cc | 414 const std::vector<int>& ciphers) { 421 for (std::vector<int>::const_iterator cipher = ciphers.begin(); 422 cipher != ciphers.end(); ++cipher) { 788 // Specify an ECDH group for ECDHE ciphers, otherwise they cannot be 1008 // Select list of available ciphers. Note that !SHA256 and !SHA384 only [all...] |
opensslstreamadapter.h | 201 // The DtlsSrtp ciphers
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
BlockCipherTestBase.java | 177 // Authenticated ciphers do not return any output when decrypting until doFinal where 190 // Unauthenticated stream ciphers do not buffer input or output. 243 // Unauthenticated stream ciphers do not buffer input or output. 264 // Non-stream authenticated ciphers not supported 635 // Stream ciphers always produce output for non-empty input. [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast.c | 1445 u8 ciphers[7]; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_internal.c | 633 u8 *ciphers) 637 return tlsv1_client_set_cipher_list(conn->client, ciphers); 641 return tlsv1_server_set_cipher_list(conn->server, ciphers);
|
/external/boringssl/src/crypto/cipher/ |
cipher_test.cc | 151 // The ciphers are run with no padding. For each of the ciphers we test, the
|
e_ssl3.c | 42 * length for legacy ciphers. */ 267 * ciphers are already broken. Support will be removed eventually.
|
/external/srtp/ |
Makefile.in | 77 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \ 98 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(replay)
|
srtp7.vcproj | 143 Name="Ciphers">
|
/external/webrtc/webrtc/p2p/base/ |
p2ptransportchannel.h | 122 // Set up the ciphers to use for DTLS-SRTP. 123 bool SetSrtpCryptoSuites(const std::vector<int>& ciphers) override {
|
/external/nist-sip/java/gov/nist/javax/sip/ |
SipStackExt.java | 119 * @param newCipherSuites -- The new set of ciphers to support.
|
/external/okhttp/benchmarks/src/main/java/com/squareup/okhttp/benchmarks/ |
Benchmark.java | 64 // TODO: compare different ciphers?
|
/external/srtp/crypto/include/ |
crypto_kernel.h | 154 * running tests on the ciphers, auth funcs, and rng, and prints out a
|
crypto_types.h | 72 * @defgroup Ciphers Cipher Types
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.c | 758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) 768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
tlsv1_server.c | 655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) 665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/libcore/ojluni/src/main/java/javax/crypto/spec/ |
GCMParameterSpec.java | 43 * (Additional Authenticated Data (AAD), Keys, block ciphers,
|