Searched defs:ciphers (Results 1 - 25 of 71) sorted by relevance

123

/external/chromium_org/chrome/browser/prefs/
H A Dcommand_line_pref_store_unittest.cc43 void VerifySSLCipherSuites(const char* const* ciphers, argument
53 it != list_value->end(); ++it, ++ciphers) {
55 EXPECT_EQ(*ciphers, cipher_string);
/external/chromium_org/third_party/libjingle/source/talk/base/
H A Dsslstreamadapter.h171 virtual bool SetDtlsSrtpCiphers(const std::vector<std::string>& ciphers) { argument
/external/chromium_org/third_party/openssl/openssl/apps/
H A Dciphers.c1 /* apps/ciphers.c */
73 "usage: ciphers args\n",
74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n",
93 char *ciphers=NULL; local
149 ciphers= *argv;
166 if (ciphers != NULL) {
167 if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/
H A DBlockCipherFactory.java35 private static final List<CipherEntry> ciphers = new Vector<CipherEntry>(); field in class:BlockCipherFactory
40 ciphers.add(new CipherEntry("aes128-ctr", 16, 16, "ch.ethz.ssh2.crypto.cipher.AES"));
41 ciphers.add(new CipherEntry("aes192-ctr", 16, 24, "ch.ethz.ssh2.crypto.cipher.AES"));
42 ciphers.add(new CipherEntry("aes256-ctr", 16, 32, "ch.ethz.ssh2.crypto.cipher.AES"));
43 ciphers.add(new CipherEntry("blowfish-ctr", 8, 16, "ch.ethz.ssh2.crypto.cipher.BlowFish"));
45 ciphers.add(new CipherEntry("aes128-cbc", 16, 16, "ch.ethz.ssh2.crypto.cipher.AES"));
46 ciphers.add(new CipherEntry("aes192-cbc", 16, 24, "ch.ethz.ssh2.crypto.cipher.AES"));
47 ciphers.add(new CipherEntry("aes256-cbc", 16, 32, "ch.ethz.ssh2.crypto.cipher.AES"));
48 ciphers.add(new CipherEntry("blowfish-cbc", 8, 16, "ch.ethz.ssh2.crypto.cipher.BlowFish"));
50 ciphers
[all...]
/external/openssl/apps/
H A Dciphers.c1 /* apps/ciphers.c */
73 "usage: ciphers args\n",
74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n",
93 char *ciphers=NULL; local
149 ciphers= *argv;
166 if (ciphers != NULL) {
167 if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
/external/chromium_org/third_party/openssl/openssl/crypto/engine/
H A Deng_int.h167 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
/external/openssl/crypto/engine/
H A Deng_int.h167 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
/external/srtp/
H A DMakefile75 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \ macro
96 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(replay)
/external/srtp/crypto/
H A DMakefile69 ciphers = cipher/cipher.o cipher/null_cipher.o \ macro
87 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(xfm)
/external/chromium_org/net/socket/
H A Dnss_ssl_util.cc35 // |to_remove| and sets every instance of them in |ciphers| to zero. It returns
37 // there are no duplicates in |ciphers| nor in |to_remove|.
38 bool CiphersRemove(const uint16* to_remove, uint16* ciphers, size_t num) { argument
46 if (to_remove[i] == ciphers[j]) {
47 ciphers[j] = 0;
57 // CiphersCompact takes an array of cipher suite ids in |ciphers|, where some
60 void CiphersCompact(uint16* ciphers, size_t num) { argument
64 if (ciphers[i] == 0)
66 ciphers[j--] = ciphers[
[all...]
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Drawtransportchannel.h121 // Set up the ciphers to use for DTLS-SRTP.
122 virtual bool SetSrtpCiphers(const std::vector<std::string>& ciphers) { argument
H A Dtransportchannelproxy.cc93 // Push down the SRTP ciphers, if any were set.
165 ciphers) {
167 pending_srtp_ciphers_ = ciphers; // Cache so we can send later, but always
170 return impl_->SetSrtpCiphers(ciphers);
164 SetSrtpCiphers(const std::vector<std::string>& ciphers) argument
H A Ddtlstransportchannel.cc279 LOG_J(LS_ERROR, this) << "Couldn't set DTLS-SRTP ciphers.";
291 const std::vector<std::string>& ciphers) {
292 if (srtp_ciphers_ == ciphers)
296 // We don't support DTLS renegotiation currently. If new set of srtp ciphers
305 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher);
306 if (iter == ciphers.end()) {
308 for (size_t i = 0; i < ciphers.size(); ++i) {
310 requested_str.append(ciphers[i]);
313 LOG(LS_WARNING) << "Ignoring new set of SRTP ciphers, a
290 SetSrtpCiphers( const std::vector<std::string>& ciphers) argument
[all...]
H A Ddtlstransportchannel_unittest.cc158 // SRTP ciphers will be set only in the beginning.
161 std::vector<std::string> ciphers; local
162 ciphers.push_back(AES_CM_128_HMAC_SHA1_80);
163 ASSERT_TRUE((*it)->SetSrtpCiphers(ciphers));
442 // Check that we negotiated the right ciphers.
H A Dp2ptransportchannel.h121 // Set up the ciphers to use for DTLS-SRTP.
122 virtual bool SetSrtpCiphers(const std::vector<std::string>& ciphers) { argument
/external/openssh/
H A Dcipher.c68 } ciphers[] = { variable in typeref:struct:Cipher
138 for (c = ciphers; c->name != NULL; c++)
148 for (c = ciphers; c->name != NULL; c++)
176 debug3("ciphers ok: [%s]", names);
192 for (c = ciphers; c->name != NULL; c++)
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth_ie.c382 int ciphers, key_mgmt, res, version; local
512 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
514 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
515 if (!ciphers) {
531 if (ciphers & WPA_CIPHER_TKIP) {
567 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_none.c137 u8 *ciphers)
136 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_server.c575 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
579 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
585 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth_ie.c382 int ciphers, key_mgmt, res, version; local
512 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
514 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
515 if (!ciphers) {
531 if (ciphers & WPA_CIPHER_TKIP) {
567 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
/external/wpa_supplicant_8/src/crypto/
H A Dtls_none.c137 u8 *ciphers)
136 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_server.c575 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
579 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
585 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth_ie.c382 int ciphers, key_mgmt, res, version; local
512 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
514 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
515 if (!ciphers) {
531 if (ciphers & WPA_CIPHER_TKIP) {
567 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_none.c137 u8 *ciphers)
136 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_server.c575 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
579 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
585 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {

Completed in 4913 milliseconds

123