Searched refs:ciphers (Results 1 - 25 of 111) sorted by relevance

12345

/external/openssl/crypto/engine/
H A Dtb_cipher.c76 if(e->ciphers)
79 int num_nids = e->ciphers(e, NULL, &nids, 0);
98 if(e->ciphers)
101 int num_nids = e->ciphers(e, NULL, &nids, 0);
135 return e->ciphers;
141 e->ciphers = f;
/external/chromium_org/net/socket/
H A Dnss_ssl_util.cc37 // |to_remove| and sets every instance of them in |ciphers| to zero. It returns
39 // there are no duplicates in |ciphers| nor in |to_remove|.
40 bool CiphersRemove(const uint16* to_remove, uint16* ciphers, size_t num) { argument
48 if (to_remove[i] == ciphers[j]) {
49 ciphers[j] = 0;
59 // CiphersCompact takes an array of cipher suite ids in |ciphers|, where some
62 void CiphersCompact(uint16* ciphers, size_t num) { argument
66 if (ciphers[i] == 0)
68 ciphers[j--] = ciphers[
[all...]
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.c1265 int rsn_cipher_put_suites(u8 *start, int ciphers) argument
1269 if (ciphers & WPA_CIPHER_CCMP_256) {
1273 if (ciphers & WPA_CIPHER_GCMP_256) {
1277 if (ciphers & WPA_CIPHER_CCMP) {
1281 if (ciphers & WPA_CIPHER_GCMP) {
1285 if (ciphers & WPA_CIPHER_TKIP) {
1289 if (ciphers & WPA_CIPHER_NONE) {
1298 int wpa_cipher_put_suites(u8 *start, int ciphers) argument
1302 if (ciphers & WPA_CIPHER_CCMP) {
1306 if (ciphers
1319 wpa_pick_pairwise_cipher(int ciphers, int none_allowed) argument
1337 wpa_pick_group_cipher(int ciphers) argument
1412 wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim) argument
[all...]
/external/wpa_supplicant_8/src/common/
H A Dwpa_common.c1265 int rsn_cipher_put_suites(u8 *start, int ciphers) argument
1269 if (ciphers & WPA_CIPHER_CCMP_256) {
1273 if (ciphers & WPA_CIPHER_GCMP_256) {
1277 if (ciphers & WPA_CIPHER_CCMP) {
1281 if (ciphers & WPA_CIPHER_GCMP) {
1285 if (ciphers & WPA_CIPHER_TKIP) {
1289 if (ciphers & WPA_CIPHER_NONE) {
1298 int wpa_cipher_put_suites(u8 *start, int ciphers) argument
1302 if (ciphers & WPA_CIPHER_CCMP) {
1306 if (ciphers
1319 wpa_pick_pairwise_cipher(int ciphers, int none_allowed) argument
1337 wpa_pick_group_cipher(int ciphers) argument
1412 wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_common.c1265 int rsn_cipher_put_suites(u8 *start, int ciphers) argument
1269 if (ciphers & WPA_CIPHER_CCMP_256) {
1273 if (ciphers & WPA_CIPHER_GCMP_256) {
1277 if (ciphers & WPA_CIPHER_CCMP) {
1281 if (ciphers & WPA_CIPHER_GCMP) {
1285 if (ciphers & WPA_CIPHER_TKIP) {
1289 if (ciphers & WPA_CIPHER_NONE) {
1298 int wpa_cipher_put_suites(u8 *start, int ciphers) argument
1302 if (ciphers & WPA_CIPHER_CCMP) {
1306 if (ciphers
1319 wpa_pick_pairwise_cipher(int ciphers, int none_allowed) argument
1337 wpa_pick_group_cipher(int ciphers) argument
1412 wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim) argument
[all...]
/external/chromium_org/third_party/boringssl/src/ssl/
H A Dssl_test.c28 /* The list of expected ciphers, in order, terminated with -1. */
32 /* Selecting individual ciphers should work. */
47 /* + reorders selected ciphers to the end, keeping their relative
64 /* ! banishes ciphers from future selections. */
86 /* - removes selected ciphers, but preserves their order for future
131 * ciphers and only the selected ciphers. */
136 /* Order some ciphers backwards by strength. */
194 for (i = 0; i < sk_SSL_CIPHER_num(list->ciphers); i++) {
195 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(list->ciphers,
[all...]
/external/openssl/apps/
H A Dciphers.c1 /* apps/ciphers.c */
73 "usage: ciphers args\n",
74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n",
93 char *ciphers=NULL; local
143 ciphers= *argv;
160 if (ciphers != NULL) {
161 if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
H A Dprogs.pl34 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Ddtlstransportchannel.cc285 LOG_J(LS_ERROR, this) << "Couldn't set DTLS-SRTP ciphers.";
297 const std::vector<std::string>& ciphers) {
298 if (srtp_ciphers_ == ciphers)
302 LOG(LS_WARNING) << "Ignoring new SRTP ciphers while DTLS is negotiating";
307 // We don't support DTLS renegotiation currently. If new set of srtp ciphers
316 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher);
317 if (iter == ciphers.end()) {
319 for (size_t i = 0; i < ciphers.size(); ++i) {
321 requested_str.append(ciphers[
296 SetSrtpCiphers( const std::vector<std::string>& ciphers) argument
[all...]
H A Dtransportchannel.h105 // Sets up the ciphers to use for DTLS-SRTP.
106 virtual bool SetSrtpCiphers(const std::vector<std::string>& ciphers) = 0;
H A Dtransportchannelproxy.cc92 // Push down the SRTP ciphers, if any were set.
164 ciphers) {
166 pending_srtp_ciphers_ = ciphers; // Cache so we can send later, but always
169 return impl_->SetSrtpCiphers(ciphers);
163 SetSrtpCiphers(const std::vector<std::string>& ciphers) argument
/external/chromium_org/third_party/webrtc/base/
H A Dsslstreamadapter.h145 virtual bool SetDtlsSrtpCiphers(const std::vector<std::string>& ciphers) { argument
H A Dnssstreamadapter.h73 virtual bool SetDtlsSrtpCiphers(const std::vector<std::string>& ciphers);
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client.h41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
H A Dtlsv1_server.h37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client.h41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
H A Dtlsv1_server.h37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client.h41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
H A Dtlsv1_server.h37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
/external/chromium_org/third_party/libsrtp/srtp/crypto/
H A DMakefile76 ciphers = cipher/cipher.o cipher/null_cipher.o \ macro
94 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(xfm)
/external/srtp/crypto/
H A DMakefile69 ciphers = cipher/cipher.o cipher/null_cipher.o \ macro
87 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(xfm)
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_none.c137 u8 *ciphers)
136 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/wpa_supplicant_8/src/crypto/
H A Dtls_none.c137 u8 *ciphers)
136 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_none.c137 u8 *ciphers)
136 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/chromium_org/chrome/browser/prefs/
H A Dcommand_line_pref_store_unittest.cc44 void VerifySSLCipherSuites(const char* const* ciphers, argument
55 it != list_value->end(); ++it, ++ciphers) {
57 EXPECT_EQ(*ciphers, cipher_string);

Completed in 2096 milliseconds

12345