/external/chromium_org/chrome/browser/prefs/ |
H A D | command_line_pref_store_unittest.cc | 43 void VerifySSLCipherSuites(const char* const* ciphers, argument 53 it != list_value->end(); ++it, ++ciphers) { 55 EXPECT_EQ(*ciphers, cipher_string);
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
H A D | sslstreamadapter.h | 164 virtual bool SetDtlsSrtpCiphers(const std::vector<std::string>& ciphers) { argument
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
H A D | ciphers.c | 1 /* apps/ciphers.c */ 73 "usage: ciphers args\n", 74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n", 93 char *ciphers=NULL; local 149 ciphers= *argv; 166 if (ciphers != NULL) { 167 if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
H A D | BlockCipherFactory.java | 35 private static final List<CipherEntry> ciphers = new Vector<CipherEntry>(); field in class:BlockCipherFactory 40 ciphers.add(new CipherEntry("aes128-ctr", 16, 16, "ch.ethz.ssh2.crypto.cipher.AES")); 41 ciphers.add(new CipherEntry("aes192-ctr", 16, 24, "ch.ethz.ssh2.crypto.cipher.AES")); 42 ciphers.add(new CipherEntry("aes256-ctr", 16, 32, "ch.ethz.ssh2.crypto.cipher.AES")); 43 ciphers.add(new CipherEntry("blowfish-ctr", 8, 16, "ch.ethz.ssh2.crypto.cipher.BlowFish")); 45 ciphers.add(new CipherEntry("aes128-cbc", 16, 16, "ch.ethz.ssh2.crypto.cipher.AES")); 46 ciphers.add(new CipherEntry("aes192-cbc", 16, 24, "ch.ethz.ssh2.crypto.cipher.AES")); 47 ciphers.add(new CipherEntry("aes256-cbc", 16, 32, "ch.ethz.ssh2.crypto.cipher.AES")); 48 ciphers.add(new CipherEntry("blowfish-cbc", 8, 16, "ch.ethz.ssh2.crypto.cipher.BlowFish")); 50 ciphers [all...] |
/external/openssl/apps/ |
H A D | ciphers.c | 1 /* apps/ciphers.c */ 73 "usage: ciphers args\n", 74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n", 93 char *ciphers=NULL; local 149 ciphers= *argv; 166 if (ciphers != NULL) { 167 if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | transportchannel.h | 107 // Set up the ciphers to use for DTLS-SRTP. 108 virtual bool SetSrtpCiphers(const std::vector<std::string>& ciphers) { argument
|
H A D | transportchannelproxy.cc | 85 // Push down the SRTP ciphers, if any were set. 139 ciphers) { 141 pending_srtp_ciphers_ = ciphers; // Cache so we can send later, but always 144 return impl_->SetSrtpCiphers(ciphers); 138 SetSrtpCiphers(const std::vector<std::string>& ciphers) argument
|
H A D | dtlstransportchannel.cc | 255 LOG_J(LS_ERROR, this) << "Couldn't set DTLS-SRTP ciphers"; 267 ciphers) { 268 // SRTP ciphers must be set before the DTLS handshake starts. 272 // fix this would be for the TransportProxyChannels to intersect the ciphers 281 srtp_ciphers_ = ciphers; 266 SetSrtpCiphers(const std::vector<std::string>& ciphers) argument
|
H A D | dtlstransportchannel_unittest.cc | 143 std::vector<std::string> ciphers; local 144 ciphers.push_back(AES_CM_128_HMAC_SHA1_80); 145 ASSERT_TRUE((*it)->SetSrtpCiphers(ciphers)); 394 // Check that we negotiated the right ciphers.
|
/external/chromium_org/third_party/openssl/openssl/crypto/engine/ |
H A D | eng_int.h | 167 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
|
/external/openssl/crypto/engine/ |
H A D | eng_int.h | 167 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
|
/external/srtp/ |
H A D | Makefile | 75 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \ macro 96 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(replay)
|
/external/srtp/crypto/ |
H A D | Makefile | 69 ciphers = cipher/cipher.o cipher/null_cipher.o \ macro 87 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(xfm)
|
/external/openssh/ |
H A D | cipher.c | 68 } ciphers[] = { variable in typeref:struct:Cipher 138 for (c = ciphers; c->name != NULL; c++) 148 for (c = ciphers; c->name != NULL; c++) 176 debug3("ciphers ok: [%s]", names); 192 for (c = ciphers; c->name != NULL; c++)
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.c | 382 int ciphers, key_mgmt, res, version; local 512 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 514 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 515 if (!ciphers) { 531 if (ciphers & WPA_CIPHER_TKIP) { 567 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_none.c | 137 u8 *ciphers) 136 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
H A D | tls_internal.c | 520 u8 *ciphers) 524 return tlsv1_client_set_cipher_list(conn->client, ciphers); 528 return tlsv1_server_set_cipher_list(conn->server, ciphers); 519 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_server.c | 575 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 579 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument 585 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
H A D | tlsv1_client.c | 723 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 727 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument 733 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.c | 382 int ciphers, key_mgmt, res, version; local 512 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 514 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 515 if (!ciphers) { 531 if (ciphers & WPA_CIPHER_TKIP) { 567 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_none.c | 137 u8 *ciphers) 136 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_server.c | 575 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 579 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument 585 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.c | 382 int ciphers, key_mgmt, res, version; local 512 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 514 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 515 if (!ciphers) { 531 if (ciphers & WPA_CIPHER_TKIP) { 567 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_none.c | 137 u8 *ciphers) 136 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_server.c | 575 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 579 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument 585 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|