HomeSort by relevance Sort by last modified time
    Searched full:ciphers (Results 76 - 100 of 206) sorted by null

1 2 34 5 6 7 8 9

  /prebuilts/tools/common/m2/repository/io/netty/netty-handler/4.1.0.CR3/
netty-handler-4.1.0.CR3.jar 
  /external/webrtc/webrtc/p2p/base/
faketransportcontroller.h 245 bool SetSrtpCryptoSuites(const std::vector<int>& ciphers) override {
246 srtp_ciphers_ = ciphers;
  /external/boringssl/src/tool/
client.cc 36 "An OpenSSL-style cipher suite string that configures the offered ciphers",
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
BufferedBlockCipher.java 5 * A wrapper class that allows block ciphers to be used to process data in
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/paddings/
PaddedBufferedBlockCipher.java 12 * A wrapper class that allows block ciphers to be used to process data in
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/util/
PublicKeyFactory.java 50 * Factory to create asymmetric public key parameters for asymmetric ciphers from range of
  /external/curl/docs/
TODO 99 15.3 Add support for the --ciphers option
539 15.3 Add support for the --ciphers option
545 Therefore support for the existing --ciphers option should be implemented
547 - Specifying Schannel Ciphers and Cipher Strengths
  /external/ipsec-tools/
NEWS 88 o Ciphers are now used through the 'EVP' interface which allows
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
SSLSessionContextTest.java 179 // Certificate key length too long for export ciphers
  /external/iw/
info.c 297 __u32 *ciphers = nla_data(tb_msg[NL80211_ATTR_CIPHER_SUITES]); local
299 printf("\tSupported Ciphers:\n");
302 cipher_name(ciphers[i]));
  /external/wpa_supplicant_8/src/crypto/
tls.h 473 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
479 u8 *ciphers);
  /device/google/marlin/
wpa_supplicant_wcn.conf 270 # pairwise: list of accepted pairwise (unicast) ciphers for WPA
277 # group: list of accepted group (broadcast/multicast) ciphers for WPA
402 # setup RSA to use ephemeral DH key exchange. In addition, ciphers with
501 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers
627 ## and all valid ciphers.
  /external/boringssl/src/ssl/
internal.h 211 * ciphers. It returns 1 on success and 0 on error. */
223 /* ssl_create_cipher_list evaluates |rule_str| according to the ciphers in
226 * |*out_cipher_list_by_id| is set to a list of selected ciphers sorted by
227 * id. It returns |(*out_cipher_list)->ciphers| on success and NULL on
252 * case for plain PSK ciphers. */
255 /* ssl_cipher_get_record_split_len, for TLS 1.0 CBC mode ciphers, returns the
557 /* SSL_ECDH_CTX_init_for_dhe sets up |ctx| for use with legacy DHE-based ciphers
    [all...]
s3_clnt.c 601 STACK_OF(SSL_CIPHER) *ciphers = SSL_get_ciphers(ssl);
605 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) {
606 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i);
607 /* Skip disabled ciphers */
622 /* If all ciphers were disabled, return the error to the caller. */
    [all...]
ssl_lib.c 262 sk_SSL_CIPHER_num(ret->cipher_list->ciphers) <= 0) {
968 sk_SSL_CIPHER_free(cipher_list->ciphers);
    [all...]
d1_lib.c 156 /* DTLS does not support stream ciphers. The NULL cipher is rejected because
  /external/libvncserver/webclients/java-applet/ssl/
ss_vncviewer 212 ciphers=""
276 "-anondh") ciphers="ciphers=$anondh"
281 "-ciphers") shift; ciphers="ciphers=$1"
    [all...]
  /external/boringssl/src/crypto/cipher/test/
make_legacy_aead_tests.go 312 // For CBC-mode ciphers, emit tests for padding flexibility.
  /external/curl/lib/vtls/
openssl.c 708 /* Init the global ciphers and digests */
737 /* Free ciphers and digests lists */
1673 char *ciphers; local
    [all...]
  /external/srtp/
Changes 123 cipher_array_alloc_init() creates an array of ciphers for use in
srtp.vcproj 367 Name="Ciphers"
  /external/srtp/crypto/kernel/
crypto_kernel.c 417 * any ciphers - this is a bit extra-paranoid
  /external/wpa_supplicant_8/src/eap_peer/
eap.h 292 * default ciphers. If not set, "DEFAULT:!EXP:!LOW" is used as the
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.h 218 * default ciphers. If not set, "DEFAULT:!EXP:!LOW" is used as the
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreSignatureSpiBase.java 41 * Base class for {@link SignatureSpi} implementations of Android KeyStore backed ciphers.

Completed in 1577 milliseconds

1 2 34 5 6 7 8 9