/prebuilts/tools/common/m2/repository/io/netty/netty-handler/4.1.0.CR3/ |
netty-handler-4.1.0.CR3.jar | |
/external/webrtc/webrtc/p2p/base/ |
faketransportcontroller.h | 245 bool SetSrtpCryptoSuites(const std::vector<int>& ciphers) override { 246 srtp_ciphers_ = ciphers;
|
/external/boringssl/src/tool/ |
client.cc | 36 "An OpenSSL-style cipher suite string that configures the offered ciphers",
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
BufferedBlockCipher.java | 5 * A wrapper class that allows block ciphers to be used to process data in
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/paddings/ |
PaddedBufferedBlockCipher.java | 12 * A wrapper class that allows block ciphers to be used to process data in
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/util/ |
PublicKeyFactory.java | 50 * Factory to create asymmetric public key parameters for asymmetric ciphers from range of
|
/external/curl/docs/ |
TODO | 99 15.3 Add support for the --ciphers option 539 15.3 Add support for the --ciphers option 545 Therefore support for the existing --ciphers option should be implemented 547 - Specifying Schannel Ciphers and Cipher Strengths
|
/external/ipsec-tools/ |
NEWS | 88 o Ciphers are now used through the 'EVP' interface which allows
|
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
SSLSessionContextTest.java | 179 // Certificate key length too long for export ciphers
|
/external/iw/ |
info.c | 297 __u32 *ciphers = nla_data(tb_msg[NL80211_ATTR_CIPHER_SUITES]); local 299 printf("\tSupported Ciphers:\n"); 302 cipher_name(ciphers[i]));
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 473 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 479 u8 *ciphers);
|
/device/google/marlin/ |
wpa_supplicant_wcn.conf | 270 # pairwise: list of accepted pairwise (unicast) ciphers for WPA 277 # group: list of accepted group (broadcast/multicast) ciphers for WPA 402 # setup RSA to use ephemeral DH key exchange. In addition, ciphers with 501 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers 627 ## and all valid ciphers.
|
/external/boringssl/src/ssl/ |
internal.h | 211 * ciphers. It returns 1 on success and 0 on error. */ 223 /* ssl_create_cipher_list evaluates |rule_str| according to the ciphers in 226 * |*out_cipher_list_by_id| is set to a list of selected ciphers sorted by 227 * id. It returns |(*out_cipher_list)->ciphers| on success and NULL on 252 * case for plain PSK ciphers. */ 255 /* ssl_cipher_get_record_split_len, for TLS 1.0 CBC mode ciphers, returns the 557 /* SSL_ECDH_CTX_init_for_dhe sets up |ctx| for use with legacy DHE-based ciphers [all...] |
s3_clnt.c | 601 STACK_OF(SSL_CIPHER) *ciphers = SSL_get_ciphers(ssl); 605 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { 606 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); 607 /* Skip disabled ciphers */ 622 /* If all ciphers were disabled, return the error to the caller. */ [all...] |
ssl_lib.c | 262 sk_SSL_CIPHER_num(ret->cipher_list->ciphers) <= 0) { 968 sk_SSL_CIPHER_free(cipher_list->ciphers); [all...] |
d1_lib.c | 156 /* DTLS does not support stream ciphers. The NULL cipher is rejected because
|
/external/libvncserver/webclients/java-applet/ssl/ |
ss_vncviewer | 212 ciphers="" 276 "-anondh") ciphers="ciphers=$anondh" 281 "-ciphers") shift; ciphers="ciphers=$1" [all...] |
/external/boringssl/src/crypto/cipher/test/ |
make_legacy_aead_tests.go | 312 // For CBC-mode ciphers, emit tests for padding flexibility.
|
/external/curl/lib/vtls/ |
openssl.c | 708 /* Init the global ciphers and digests */ 737 /* Free ciphers and digests lists */ 1673 char *ciphers; local [all...] |
/external/srtp/ |
Changes | 123 cipher_array_alloc_init() creates an array of ciphers for use in
|
srtp.vcproj | 367 Name="Ciphers"
|
/external/srtp/crypto/kernel/ |
crypto_kernel.c | 417 * any ciphers - this is a bit extra-paranoid
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap.h | 292 * default ciphers. If not set, "DEFAULT:!EXP:!LOW" is used as the
|
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.h | 218 * default ciphers. If not set, "DEFAULT:!EXP:!LOW" is used as the
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSignatureSpiBase.java | 41 * Base class for {@link SignatureSpi} implementations of Android KeyStore backed ciphers.
|