/external/boringssl/src/ssl/test/runner/ |
runner.go | [all...] |
/external/curl/src/ |
tool_help.c | 57 " --ciphers LIST SSL ciphers to use (SSL)",
|
/external/srtp/doc/ |
intro.txt | 165 kernel\_driver & crypto kernel (ciphers, auth funcs, rng) \\ 170 cipher\_driver & ciphers \\
|
rfc3711.txt | 537 Typical examples of such parameters are block size of ciphers, 613 packet (see Section 4.1, for the defined ciphers). This step uses 676 the defined ciphers), using the decryption algorithm indicated in [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 869 const char *ciphers; local 999 ciphers = conf->openssl_ciphers; 1001 ciphers = "DEFAULT:!EXP:!LOW"; 1002 if (SSL_CTX_set_cipher_list(ssl, ciphers) != 1) { 1005 ciphers); [all...] |
des-internal.c | 2 * DES and 3DES-EDE ciphers
|
crypto.h | 223 * @iv: Initialization vector for block ciphers or %NULL for stream ciphers
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 169 * ciphers with DSA keys always use ephemeral DH keys. This can be used 733 * ciphers for this connection. If not set, the default cipher suite
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config_ssid.h | 189 * pairwise_cipher - Bitfield of allowed pairwise ciphers, WPA_CIPHER_* 194 * group_cipher - Bitfield of allowed group ciphers, WPA_CIPHER_*
|
wpa_supplicant.conf | 185 # ciphers. If not set, "DEFAULT:!EXP:!LOW" is used as the default. 186 # See https://www.openssl.org/docs/apps/ciphers.html for OpenSSL documentation [all...] |
/system/connectivity/shill/wifi/ |
wifi_endpoint.cc | 492 // | Pairwise Cipher Count | Pairwise Ciphers... | 515 // Advance past the pairwise and authkey ciphers. Each is a little-endian
|
/external/wpa_supplicant_8/src/drivers/ |
driver_bsd.c | 464 /* key length is done only for specific ciphers */ 480 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v); 483 "Unable to set pairwise key ciphers to 0x%x", v); [all...] |
driver_nl80211_capa.c | 259 u32 *ciphers; local 265 ciphers = nla_data(tb); 267 u32 c = ciphers[i]; [all...] |
/external/boringssl/src/include/openssl/ |
ssl3.h | 249 * record. This does not include the record header. Some ciphers use explicit
|
/external/boringssl/src/ssl/ |
ssl_stat.c | 101 return "SSL renegotiate ciphers";
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
GCMBlockCipher.java | 565 // TODO Sure would be nice if ciphers could operate on int[]
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
Connection.java | 227 // Configure the socket's ciphers, TLS versions, and extensions.
|
/external/wpa_supplicant_8/hostapd/ |
defconfig | 263 # can be enabled to get a stronger construction of messages when block ciphers
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 28 * currently used ciphers.
|
/frameworks/base/wifi/java/android/net/wifi/ |
WifiConfiguration.java | 146 * Recognized pairwise ciphers for WPA. 164 * Recognized group ciphers. 335 * The set of pairwise ciphers for WPA supported by this configuration. 341 * The set of group ciphers supported by this configuration. [all...] |
/external/curl/docs/ |
curl.1 | 268 .IP "--ciphers <list of ciphers>" 269 (SSL) Specifies which ciphers to use in the connection. The list of ciphers 270 must specify valid ciphers. Read up on SSL cipher list details on this URL: 271 \fIhttps://www.openssl.org/docs/apps/ciphers.html\fP 273 NSS ciphers are done differently than OpenSSL and GnuTLS. The full list of NSS 274 ciphers is in the NSSCipherSuite entry at this URL: [all...] |
/external/curl/tests/ |
sshserver.pl | 415 # Ciphers : OpenSSH 2.1.0 and later [3] 781 # Ciphers : OpenSSH 2.1.0 and later [3] [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
KeyProtection.java | 616 * <li>transformation which do not offer {@code IND-CPA}, such as symmetric ciphers using 618 * <li>in transformations which use an IV, such as symmetric ciphers in {@code GCM}, [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
conn.go | 231 // cbcMode is an interface for block ciphers using cipher block chaining. 858 // attack when using block mode ciphers due to predictable IVs.
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
conn.go | 231 // cbcMode is an interface for block ciphers using cipher block chaining. 858 // attack when using block mode ciphers due to predictable IVs.
|