/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_client_test.go | 469 command: []string{"openssl", "s_server", "-cipher", "RC4-SHA"}, 479 command: []string{"openssl", "s_server", "-cipher", "AES128-GCM-SHA256"}, 487 command: []string{"openssl", "s_server", "-cipher", "AES256-GCM-SHA384"}, 495 command: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-SHA"}, 505 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"}, 517 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"}, 527 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"}, 537 command: []string{"openssl", "s_server", "-cipher", "AES128-SHA256"}, 545 command: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-SHA256"}, 553 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA256"} [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_client_test.go | 469 command: []string{"openssl", "s_server", "-cipher", "RC4-SHA"}, 479 command: []string{"openssl", "s_server", "-cipher", "AES128-GCM-SHA256"}, 487 command: []string{"openssl", "s_server", "-cipher", "AES256-GCM-SHA384"}, 495 command: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-SHA"}, 505 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"}, 517 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"}, 527 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"}, 537 command: []string{"openssl", "s_server", "-cipher", "AES128-SHA256"}, 545 command: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-SHA256"}, 553 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA256"} [all...] |
/bionic/libc/kernel/uapi/linux/ |
virtio_crypto.h | 162 struct virtio_crypto_cipher_session_req cipher; member in union:virtio_crypto_sym_create_session_req::__anon1262 248 struct virtio_crypto_cipher_data_req cipher; member in union:virtio_crypto_sym_data_req::__anon1264
|
/external/ImageMagick/MagickCore/ |
Android.mk | 108 cipher.c\
|
/external/boringssl/src/fipstools/ |
cavp_test_util.cc | 79 bool CipherOperation(const EVP_CIPHER *cipher, std::vector<uint8_t> *out, 84 if (!EVP_CipherInit_ex(ctx.get(), cipher, nullptr, nullptr, nullptr,
|
/external/boringssl/src/ssl/test/runner/ |
shim_ticket.go | 20 "crypto/cipher" 69 cbc := cipher.NewCBCDecrypter(block, iv) 101 cbc := cipher.NewCBCEncrypter(block, iv) 239 // Next field is the cipher suite.
|
/external/kernel-headers/original/uapi/linux/ |
virtio_crypto.h | 211 struct virtio_crypto_cipher_session_req cipher; member in union:virtio_crypto_sym_create_session_req::__anon23470 220 /* Cipher only operation on the data */ 223 * Chain any cipher with any hash or mac operation. The order 285 * must be the same as the block length of the cipher). 287 * (which must be the same as the block length of the cipher). 355 /* Starting point for cipher processing in source data */ 357 /* Length of the source data that the cipher will be computed on */ 377 struct virtio_crypto_cipher_data_req cipher; member in union:virtio_crypto_sym_data_req::__anon23472 437 /* Maximum length of cipher key */
|
/external/python/cpython2/Lib/test/ |
ssl_servers.py | 81 self.request.cipher(), 99 'cipher': sock.cipher(), 186 help='allowed cipher list')
|
/external/python/cpython3/Lib/test/ |
ssl_servers.py | 81 self.request.cipher(), 99 'cipher': sock.cipher(), 186 help='allowed cipher list')
|
/external/webrtc/webrtc/p2p/base/ |
dtlstransportchannel.h | 131 // Find out which DTLS-SRTP cipher was negotiated 132 bool GetSrtpCryptoSuite(int* cipher) override; 137 // Find out which DTLS cipher was negotiated 138 bool GetSslCipherSuite(int* cipher) override;
|
p2ptransportchannel.h | 127 // Find out which DTLS-SRTP cipher was negotiated. 128 bool GetSrtpCryptoSuite(int* cipher) override { return false; } 130 // Find out which DTLS cipher was negotiated. 131 bool GetSslCipherSuite(int* cipher) override { return false; }
|
/frameworks/base/core/java/android/hardware/biometrics/ |
BiometricPrompt.java | 35 import javax.crypto.Cipher; 243 * supports {@link Signature}, {@link Cipher} and {@link Mac} objects. 250 public CryptoObject(@NonNull Cipher cipher) { 251 super(cipher); 267 * Get {@link Cipher} object. 268 * @return {@link Cipher} object or null if this doesn't contain one. 270 public Cipher getCipher() {
|
/frameworks/support/compat/src/main/java/androidx/core/hardware/fingerprint/ |
FingerprintManagerCompat.java | 33 import javax.crypto.Cipher; 189 * framework supports {@link Signature} and {@link Cipher} objects. 194 private final Cipher mCipher; 204 public CryptoObject(@NonNull Cipher cipher) { 205 mCipher = cipher; 224 * Get {@link Cipher} object. 225 * @return {@link Cipher} object or null if this doesn't contain one. 228 public Cipher getCipher() { return mCipher; }
|
/libcore/ojluni/src/main/java/javax/crypto/ |
EncryptedPrivateKeyInfo.java | 120 * for information about standard Cipher algorithm names. 203 * for information about standard Cipher algorithm names. 232 * PKCS8EncodedKeySpec object, <code>cipher</code> needs 233 * to be initialized to either Cipher.DECRYPT_MODE or 234 * Cipher.UNWRAP_MODE, with the same key and parameters used 237 * @param cipher the initialized cipher object which will be 240 * @exception NullPointerException if <code>cipher</code> 242 * @exception InvalidKeySpecException if the given cipher is 246 public PKCS8EncodedKeySpec getKeySpec(Cipher cipher [all...] |
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
io.go | 5 package cipher package
|
xor.go | 5 package cipher package
|
/prebuilts/go/darwin-x86/src/crypto/des/ |
const.go | 81 // Used in the DES cipher function
|
/prebuilts/go/linux-x86/src/crypto/cipher/ |
io.go | 5 package cipher package
|
xor.go | 5 package cipher package
|
/prebuilts/go/linux-x86/src/crypto/des/ |
const.go | 81 // Used in the DES cipher function
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 396 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) 405 res = AES_wrap_key(&actx, NULL, cipher, plain, n * 8); 411 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, 421 res = AES_unwrap_key(&actx, NULL, plain, cipher, (n + 1) * 8); 534 const EVP_CIPHER *cipher; local 544 cipher = EVP_rc4(); 552 cipher = EVP_aes_128_cbc(); 556 cipher = EVP_aes_192_cbc(); 560 cipher = EVP_aes_256_cbc(); 570 cipher = EVP_des_ede3_cbc() [all...] |
/external/boringssl/src/crypto/cipher_extra/ |
e_tls.c | 20 #include <openssl/cipher.h> 28 #include "../fipsmodule/cipher/internal.h" 40 // implicit_iv is one iff this is a pre-TLS-1.1 CBC cipher without an explicit 57 const EVP_CIPHER *cipher, const EVP_MD *md, 61 OPENSSL_PUT_ERROR(CIPHER, CIPHER_R_UNSUPPORTED_TAG_SIZE); 66 OPENSSL_PUT_ERROR(CIPHER, CIPHER_R_BAD_KEY_LENGTH); 71 size_t enc_key_len = EVP_CIPHER_key_length(cipher); 73 (implicit_iv ? EVP_CIPHER_iv_length(cipher) : 0) == key_len); 77 OPENSSL_PUT_ERROR(CIPHER, ERR_R_MALLOC_FAILURE); 88 if (!EVP_CipherInit_ex(&tls_ctx->cipher_ctx, cipher, NULL, &key[mac_key_len] [all...] |
/external/boringssl/src/ssl/ |
tls13_enc.cc | 36 const SSL_CIPHER *cipher) { 37 if (!hs->transcript.InitHash(version, cipher)) { 64 ssl->session->cipher) && 147 // Look up cipher suite properties. 150 if (!ssl_cipher_get_evp_aead(&aead, &discard, &discard, session->cipher, 175 session->cipher, MakeConstSpan(key, key_len),
|
/external/boringssl/src/include/openssl/ |
ssl.h | 112 * ECC cipher suite support in OpenSSL originally developed by 4189 const SSL_CIPHER *cipher; member in struct:ssl_session_st [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 107 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer 212 switch (peer->cipher) { 218 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: " 222 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", 711 peer->cipher = 0; 1100 * RSN IE is filled only with CCMP CIPHER 1103 * Regardless of the cipher used on the AP connection, select CCMP 1790 int cipher; local 2179 int cipher; local [all...] |