/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
H A D | SSLSocketFunctionalTest.java | 42 private String[] cipher_suites = { field in class:SSLSocketFunctionalTest 81 ? new String[] { "TLS_" + cipher_suites[0] } 82 : new String[] { "SSL_" + cipher_suites[0] }); 91 ? new String[] { "TLS_" + cipher_suites[0] } 92 : new String[] { "SSL_" + cipher_suites[0] }); 98 for (int i = 0; i < cipher_suites.length; i++) { 101 + cipher_suites[i]); 119 ? new String[] { "TLS_" + cipher_suites[i] } 120 : new String[] { "SSL_" + cipher_suites[i] }); 129 ? new String[] { "TLS_" + cipher_suites[ [all...] |
H A D | SSLEngineImplTest.java | 39 private static final String[] cipher_suites = { field in class:SSLEngineImplTest 68 for (int i = 0; i < cipher_suites.length; i++) { 72 + cipher_suites[i]); 1376 new String[] { prefix + cipher_suites[0] }); 1378 new String[] { prefix + cipher_suites[0] });
|
/external/chromium_org/chrome/browser/net/ |
H A D | ssl_config_service_manager_pref.cc | 48 std::vector<uint16> cipher_suites; local 49 cipher_suites.reserve(cipher_strings.size()); 59 cipher_suites.push_back(cipher_suite); 61 std::sort(cipher_suites.begin(), cipher_suites.end()); 62 return cipher_suites;
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_server_i.h | 38 u16 cipher_suites[MAX_CIPHER_COUNT]; member in struct:tlsv1_server
|
H A D | tlsv1_client_i.h | 43 u16 cipher_suites[MAX_CIPHER_COUNT]; member in struct:tlsv1_client
|
H A D | tlsv1_client.c | 461 suites = conn->cipher_suites; 740 suites = conn->cipher_suites;
|
H A D | tlsv1_server.c | 396 suites = conn->cipher_suites; 627 suites = conn->cipher_suites;
|
H A D | tlsv1_server_read.c | 144 /* CipherSuite cipher_suites<2..2^16-1> */ 159 if (testing_cipher_suite_filter(conn, conn->cipher_suites[i])) 165 if (!cipher_suite && tmp == conn->cipher_suites[i]) {
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_server_i.h | 38 u16 cipher_suites[MAX_CIPHER_COUNT]; member in struct:tlsv1_server
|
H A D | tlsv1_client_i.h | 43 u16 cipher_suites[MAX_CIPHER_COUNT]; member in struct:tlsv1_client
|
H A D | tlsv1_client.c | 461 suites = conn->cipher_suites; 740 suites = conn->cipher_suites;
|
H A D | tlsv1_server.c | 396 suites = conn->cipher_suites; 627 suites = conn->cipher_suites;
|
H A D | tlsv1_server_read.c | 144 /* CipherSuite cipher_suites<2..2^16-1> */ 159 if (testing_cipher_suite_filter(conn, conn->cipher_suites[i])) 165 if (!cipher_suite && tmp == conn->cipher_suites[i]) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_server_i.h | 38 u16 cipher_suites[MAX_CIPHER_COUNT]; member in struct:tlsv1_server
|
H A D | tlsv1_client_i.h | 43 u16 cipher_suites[MAX_CIPHER_COUNT]; member in struct:tlsv1_client
|
H A D | tlsv1_client.c | 461 suites = conn->cipher_suites; 740 suites = conn->cipher_suites;
|
H A D | tlsv1_server.c | 396 suites = conn->cipher_suites; 627 suites = conn->cipher_suites;
|
H A D | tlsv1_server_read.c | 144 /* CipherSuite cipher_suites<2..2^16-1> */ 159 if (testing_cipher_suite_filter(conn, conn->cipher_suites[i])) 165 if (!cipher_suite && tmp == conn->cipher_suites[i]) {
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s23_srvr.c | 401 CBB client_hello, hello_body, cipher_suites; local 468 !CBB_add_u16_length_prefixed(&hello_body, &cipher_suites)) 489 if (!CBB_add_u16(&cipher_suites, cipher_spec))
|
H A D | t1_lib.c | 275 CBS client_hello, session_id, cipher_suites, compression_methods, extensions; local 302 /* Extract cipher_suites. */ 303 if (!CBS_get_u16_length_prefixed(&client_hello, &cipher_suites) || 304 CBS_len(&cipher_suites) < 2 || 305 (CBS_len(&cipher_suites) & 1) != 0) 307 ctx->cipher_suites = CBS_data(&cipher_suites); 308 ctx->cipher_suites_len = CBS_len(&cipher_suites);
|
H A D | s3_srvr.c | 716 CBS client_random, session_id, cipher_suites, compression_methods; local 947 if (!CBS_get_u16_length_prefixed(&client_hello, &cipher_suites) || 956 /* TODO(davidben): Per spec, cipher_suites can never be empty 959 * require non-empty? If a client sends empty cipher_suites 962 if (CBS_len(&cipher_suites) == 0 && CBS_len(&session_id) != 0) 970 if (ssl_bytes_to_cipher_list(s, &cipher_suites, &ciphers) == NULL) 976 if (s->hit && CBS_len(&cipher_suites) > 0)
|
/external/chromium_org/chrome/browser/prefs/ |
H A D | command_line_pref_store.cc | 170 std::string cipher_suites = local 173 base::SplitString(cipher_suites, ',', &cipher_strings);
|
/external/chromium_org/third_party/tlslite/tlslite/ |
H A D | messages.py | 108 self.cipher_suites = [] # a list of 16-bit values 119 def create(self, version, random, session_id, cipher_suites, 125 self.cipher_suites = cipher_suites 142 self.cipher_suites = p.getFixList(3, cipherSpecsLength//3) 156 self.cipher_suites = p.getVarList(2, 2) 219 w.addVarSeq(self.cipher_suites, 2, 2)
|
H A D | tlsconnection.py | 665 if serverHello.cipher_suite not in clientHello.cipher_suites: 1435 if CipherSuite.TLS_FALLBACK_SCSV in clientHello.cipher_suites: 1459 if session.cipherSuite not in clientHello.cipher_suites: 1516 for cipherSuite in clientHello.cipher_suites:
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | ssl3prot.h | 154 SECItem cipher_suites; member in struct:__anon9670
|