HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 251 - 275 of 469) sorted by null

<<111213141516171819

  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_client_test.go 469 command: []string{"openssl", "s_server", "-cipher", "RC4-SHA"},
479 command: []string{"openssl", "s_server", "-cipher", "AES128-GCM-SHA256"},
487 command: []string{"openssl", "s_server", "-cipher", "AES256-GCM-SHA384"},
495 command: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-SHA"},
505 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"},
517 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"},
527 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"},
537 command: []string{"openssl", "s_server", "-cipher", "AES128-SHA256"},
545 command: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-SHA256"},
553 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA256"}
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_client_test.go 469 command: []string{"openssl", "s_server", "-cipher", "RC4-SHA"},
479 command: []string{"openssl", "s_server", "-cipher", "AES128-GCM-SHA256"},
487 command: []string{"openssl", "s_server", "-cipher", "AES256-GCM-SHA384"},
495 command: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-SHA"},
505 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"},
517 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"},
527 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"},
537 command: []string{"openssl", "s_server", "-cipher", "AES128-SHA256"},
545 command: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-SHA256"},
553 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA256"}
    [all...]
  /bionic/libc/kernel/uapi/linux/
virtio_crypto.h 162 struct virtio_crypto_cipher_session_req cipher; member in union:virtio_crypto_sym_create_session_req::__anon1262
248 struct virtio_crypto_cipher_data_req cipher; member in union:virtio_crypto_sym_data_req::__anon1264
  /external/ImageMagick/MagickCore/
Android.mk 108 cipher.c\
  /external/boringssl/src/fipstools/
cavp_test_util.cc 79 bool CipherOperation(const EVP_CIPHER *cipher, std::vector<uint8_t> *out,
84 if (!EVP_CipherInit_ex(ctx.get(), cipher, nullptr, nullptr, nullptr,
  /external/boringssl/src/ssl/test/runner/
shim_ticket.go 20 "crypto/cipher"
69 cbc := cipher.NewCBCDecrypter(block, iv)
101 cbc := cipher.NewCBCEncrypter(block, iv)
239 // Next field is the cipher suite.
  /external/kernel-headers/original/uapi/linux/
virtio_crypto.h 211 struct virtio_crypto_cipher_session_req cipher; member in union:virtio_crypto_sym_create_session_req::__anon23470
220 /* Cipher only operation on the data */
223 * Chain any cipher with any hash or mac operation. The order
285 * must be the same as the block length of the cipher).
287 * (which must be the same as the block length of the cipher).
355 /* Starting point for cipher processing in source data */
357 /* Length of the source data that the cipher will be computed on */
377 struct virtio_crypto_cipher_data_req cipher; member in union:virtio_crypto_sym_data_req::__anon23472
437 /* Maximum length of cipher key */
  /external/python/cpython2/Lib/test/
ssl_servers.py 81 self.request.cipher(),
99 'cipher': sock.cipher(),
186 help='allowed cipher list')
  /external/python/cpython3/Lib/test/
ssl_servers.py 81 self.request.cipher(),
99 'cipher': sock.cipher(),
186 help='allowed cipher list')
  /external/webrtc/webrtc/p2p/base/
dtlstransportchannel.h 131 // Find out which DTLS-SRTP cipher was negotiated
132 bool GetSrtpCryptoSuite(int* cipher) override;
137 // Find out which DTLS cipher was negotiated
138 bool GetSslCipherSuite(int* cipher) override;
p2ptransportchannel.h 127 // Find out which DTLS-SRTP cipher was negotiated.
128 bool GetSrtpCryptoSuite(int* cipher) override { return false; }
130 // Find out which DTLS cipher was negotiated.
131 bool GetSslCipherSuite(int* cipher) override { return false; }
  /frameworks/base/core/java/android/hardware/biometrics/
BiometricPrompt.java 35 import javax.crypto.Cipher;
243 * supports {@link Signature}, {@link Cipher} and {@link Mac} objects.
250 public CryptoObject(@NonNull Cipher cipher) {
251 super(cipher);
267 * Get {@link Cipher} object.
268 * @return {@link Cipher} object or null if this doesn't contain one.
270 public Cipher getCipher() {
  /frameworks/support/compat/src/main/java/androidx/core/hardware/fingerprint/
FingerprintManagerCompat.java 33 import javax.crypto.Cipher;
189 * framework supports {@link Signature} and {@link Cipher} objects.
194 private final Cipher mCipher;
204 public CryptoObject(@NonNull Cipher cipher) {
205 mCipher = cipher;
224 * Get {@link Cipher} object.
225 * @return {@link Cipher} object or null if this doesn't contain one.
228 public Cipher getCipher() { return mCipher; }
  /libcore/ojluni/src/main/java/javax/crypto/
EncryptedPrivateKeyInfo.java 120 * for information about standard Cipher algorithm names.
203 * for information about standard Cipher algorithm names.
232 * PKCS8EncodedKeySpec object, <code>cipher</code> needs
233 * to be initialized to either Cipher.DECRYPT_MODE or
234 * Cipher.UNWRAP_MODE, with the same key and parameters used
237 * @param cipher the initialized cipher object which will be
240 * @exception NullPointerException if <code>cipher</code>
242 * @exception InvalidKeySpecException if the given cipher is
246 public PKCS8EncodedKeySpec getKeySpec(Cipher cipher
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/cipher/
io.go 5 package cipher package
xor.go 5 package cipher package
  /prebuilts/go/darwin-x86/src/crypto/des/
const.go 81 // Used in the DES cipher function
  /prebuilts/go/linux-x86/src/crypto/cipher/
io.go 5 package cipher package
xor.go 5 package cipher package
  /prebuilts/go/linux-x86/src/crypto/des/
const.go 81 // Used in the DES cipher function
  /external/wpa_supplicant_8/src/crypto/
crypto_openssl.c 396 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher)
405 res = AES_wrap_key(&actx, NULL, cipher, plain, n * 8);
411 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher,
421 res = AES_unwrap_key(&actx, NULL, plain, cipher, (n + 1) * 8);
534 const EVP_CIPHER *cipher; local
544 cipher = EVP_rc4();
552 cipher = EVP_aes_128_cbc();
556 cipher = EVP_aes_192_cbc();
560 cipher = EVP_aes_256_cbc();
570 cipher = EVP_des_ede3_cbc()
    [all...]
  /external/boringssl/src/crypto/cipher_extra/
e_tls.c 20 #include <openssl/cipher.h>
28 #include "../fipsmodule/cipher/internal.h"
40 // implicit_iv is one iff this is a pre-TLS-1.1 CBC cipher without an explicit
57 const EVP_CIPHER *cipher, const EVP_MD *md,
61 OPENSSL_PUT_ERROR(CIPHER, CIPHER_R_UNSUPPORTED_TAG_SIZE);
66 OPENSSL_PUT_ERROR(CIPHER, CIPHER_R_BAD_KEY_LENGTH);
71 size_t enc_key_len = EVP_CIPHER_key_length(cipher);
73 (implicit_iv ? EVP_CIPHER_iv_length(cipher) : 0) == key_len);
77 OPENSSL_PUT_ERROR(CIPHER, ERR_R_MALLOC_FAILURE);
88 if (!EVP_CipherInit_ex(&tls_ctx->cipher_ctx, cipher, NULL, &key[mac_key_len]
    [all...]
  /external/boringssl/src/ssl/
tls13_enc.cc 36 const SSL_CIPHER *cipher) {
37 if (!hs->transcript.InitHash(version, cipher)) {
64 ssl->session->cipher) &&
147 // Look up cipher suite properties.
150 if (!ssl_cipher_get_evp_aead(&aead, &discard, &discard, session->cipher,
175 session->cipher, MakeConstSpan(key, key_len),
  /external/boringssl/src/include/openssl/
ssl.h 112 * ECC cipher suite support in OpenSSL originally developed by
4189 const SSL_CIPHER *cipher; member in struct:ssl_session_st
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 107 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer
212 switch (peer->cipher) {
218 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: "
222 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
711 peer->cipher = 0;
1100 * RSN IE is filled only with CCMP CIPHER
1103 * Regardless of the cipher used on the AP connection, select CCMP
1790 int cipher; local
2179 int cipher; local
    [all...]

Completed in 646 milliseconds

<<111213141516171819