HomeSort by relevance Sort by last modified time
    Searched full:ciphers (Results 101 - 125 of 206) sorted by null

1 2 3 45 6 7 8 9

  /external/boringssl/src/ssl/test/runner/
runner.go     [all...]
  /external/curl/src/
tool_help.c 57 " --ciphers LIST SSL ciphers to use (SSL)",
  /external/srtp/doc/
intro.txt 165 kernel\_driver & crypto kernel (ciphers, auth funcs, rng) \\
170 cipher\_driver & ciphers \\
rfc3711.txt 537 Typical examples of such parameters are block size of ciphers,
613 packet (see Section 4.1, for the defined ciphers). This step uses
676 the defined ciphers), using the decryption algorithm indicated in
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_openssl.c 869 const char *ciphers; local
999 ciphers = conf->openssl_ciphers;
1001 ciphers = "DEFAULT:!EXP:!LOW";
1002 if (SSL_CTX_set_cipher_list(ssl, ciphers) != 1) {
1005 ciphers);
    [all...]
des-internal.c 2 * DES and 3DES-EDE ciphers
crypto.h 223 * @iv: Initialization vector for block ciphers or %NULL for stream ciphers
  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 169 * ciphers with DSA keys always use ephemeral DH keys. This can be used
733 * ciphers for this connection. If not set, the default cipher suite
  /external/wpa_supplicant_8/wpa_supplicant/
config_ssid.h 189 * pairwise_cipher - Bitfield of allowed pairwise ciphers, WPA_CIPHER_*
194 * group_cipher - Bitfield of allowed group ciphers, WPA_CIPHER_*
wpa_supplicant.conf 185 # ciphers. If not set, "DEFAULT:!EXP:!LOW" is used as the default.
186 # See https://www.openssl.org/docs/apps/ciphers.html for OpenSSL documentation
    [all...]
  /system/connectivity/shill/wifi/
wifi_endpoint.cc 492 // | Pairwise Cipher Count | Pairwise Ciphers... |
515 // Advance past the pairwise and authkey ciphers. Each is a little-endian
  /external/wpa_supplicant_8/src/drivers/
driver_bsd.c 464 /* key length is done only for specific ciphers */
480 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v);
483 "Unable to set pairwise key ciphers to 0x%x", v);
    [all...]
driver_nl80211_capa.c 259 u32 *ciphers; local
265 ciphers = nla_data(tb);
267 u32 c = ciphers[i];
    [all...]
  /external/boringssl/src/include/openssl/
ssl3.h 249 * record. This does not include the record header. Some ciphers use explicit
  /external/boringssl/src/ssl/
ssl_stat.c 101 return "SSL renegotiate ciphers";
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/
GCMBlockCipher.java 565 // TODO Sure would be nice if ciphers could operate on int[]
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
Connection.java 227 // Configure the socket's ciphers, TLS versions, and extensions.
  /external/wpa_supplicant_8/hostapd/
defconfig 263 # can be enabled to get a stronger construction of messages when block ciphers
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 28 * currently used ciphers.
  /frameworks/base/wifi/java/android/net/wifi/
WifiConfiguration.java 146 * Recognized pairwise ciphers for WPA.
164 * Recognized group ciphers.
335 * The set of pairwise ciphers for WPA supported by this configuration.
341 * The set of group ciphers supported by this configuration.
    [all...]
  /external/curl/docs/
curl.1 268 .IP "--ciphers <list of ciphers>"
269 (SSL) Specifies which ciphers to use in the connection. The list of ciphers
270 must specify valid ciphers. Read up on SSL cipher list details on this URL:
271 \fIhttps://www.openssl.org/docs/apps/ciphers.html\fP
273 NSS ciphers are done differently than OpenSSL and GnuTLS. The full list of NSS
274 ciphers is in the NSSCipherSuite entry at this URL:
    [all...]
  /external/curl/tests/
sshserver.pl 415 # Ciphers : OpenSSH 2.1.0 and later [3]
781 # Ciphers : OpenSSH 2.1.0 and later [3]
    [all...]
  /frameworks/base/keystore/java/android/security/keystore/
KeyProtection.java 616 * <li>transformation which do not offer {@code IND-CPA}, such as symmetric ciphers using
618 * <li>in transformations which use an IV, such as symmetric ciphers in {@code GCM},
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
conn.go 231 // cbcMode is an interface for block ciphers using cipher block chaining.
858 // attack when using block mode ciphers due to predictable IVs.
  /prebuilts/go/linux-x86/src/crypto/tls/
conn.go 231 // cbcMode is an interface for block ciphers using cipher block chaining.
858 // attack when using block mode ciphers due to predictable IVs.

Completed in 576 milliseconds

1 2 3 45 6 7 8 9