Searched refs:ciphers (Results 26 - 50 of 74) sorted by relevance

123

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth_ie.c462 int ciphers, key_mgmt, res, version; local
600 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
602 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
603 if (!ciphers) {
619 if (ciphers & WPA_CIPHER_TKIP) {
656 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth_ie.c462 int ciphers, key_mgmt, res, version; local
600 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
602 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
603 if (!ciphers) {
619 if (ciphers & WPA_CIPHER_TKIP) {
656 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth_ie.c462 int ciphers, key_mgmt, res, version; local
600 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
602 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
603 if (!ciphers) {
619 if (ciphers & WPA_CIPHER_TKIP) {
656 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls.h460 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
466 u8 *ciphers);
H A Dtls_openssl.c740 const char *ciphers; local
834 ciphers = conf->openssl_ciphers;
836 ciphers = "DEFAULT:!EXP:!LOW";
837 if (SSL_CTX_set_cipher_list(ssl, ciphers) != 1) {
840 ciphers);
3068 u8 *ciphers)
3074 if (conn == NULL || conn->ssl == NULL || ciphers == NULL)
3081 c = ciphers;
3067 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/wpa_supplicant_8/src/crypto/
H A Dtls.h460 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
466 u8 *ciphers);
H A Dtls_openssl.c740 const char *ciphers; local
834 ciphers = conf->openssl_ciphers;
836 ciphers = "DEFAULT:!EXP:!LOW";
837 if (SSL_CTX_set_cipher_list(ssl, ciphers) != 1) {
840 ciphers);
3068 u8 *ciphers)
3074 if (conn == NULL || conn->ssl == NULL || ciphers == NULL)
3081 c = ciphers;
3067 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls.h460 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
466 u8 *ciphers);
H A Dtls_openssl.c740 const char *ciphers; local
834 ciphers = conf->openssl_ciphers;
836 ciphers = "DEFAULT:!EXP:!LOW";
837 if (SSL_CTX_set_cipher_list(ssl, ciphers) != 1) {
840 ciphers);
3068 u8 *ciphers)
3074 if (conn == NULL || conn->ssl == NULL || ciphers == NULL)
3081 c = ciphers;
3067 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/libvncserver/webclients/java-applet/ssl/
H A Dss_vncviewer212 ciphers=""
276 "-anondh") ciphers="ciphers=$anondh"
281 "-ciphers") shift; ciphers="ciphers=$1"
3153 if [ "X$ciphers" != "X" ]; then
3154 cipher_args=`echo "$ciphers" | sed -e 's/ciphers=/-cipher /'`
3455 $ciphers
[all...]
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/
H A Dss_vncviewer212 ciphers=""
276 "-anondh") ciphers="ciphers=$anondh"
281 "-ciphers") shift; ciphers="ciphers=$1"
3120 if [ "X$ciphers" != "X" ]; then
3121 cipher_args=`echo "$ciphers" | sed -e 's/ciphers=/-cipher /'`
3418 $ciphers
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_fast.c1446 u8 ciphers[5]; local
1452 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA;
1458 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA;
1459 ciphers[count++] = TLS_CIPHER_AES128_SHA;
1460 ciphers[count++] = TLS_CIPHER_RC4_SHA;
1463 ciphers[count++] = TLS_CIPHER_NONE;
1466 ciphers)) {
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_fast.c1446 u8 ciphers[5]; local
1452 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA;
1458 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA;
1459 ciphers[count++] = TLS_CIPHER_AES128_SHA;
1460 ciphers[count++] = TLS_CIPHER_RC4_SHA;
1463 ciphers[count++] = TLS_CIPHER_NONE;
1466 ciphers)) {
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_fast.c1446 u8 ciphers[5]; local
1452 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA;
1458 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA;
1459 ciphers[count++] = TLS_CIPHER_AES128_SHA;
1460 ciphers[count++] = TLS_CIPHER_RC4_SHA;
1463 ciphers[count++] = TLS_CIPHER_NONE;
1466 ciphers)) {
/external/boringssl/src/ssl/
H A Ds3_srvr.c776 /* Skip SSLv2 ciphers. */
813 STACK_OF(SSL_CIPHER) *ciphers = NULL;
1000 ciphers = ssl_bytes_to_cipher_list(s, &cipher_suites);
1001 if (ciphers == NULL) {
1011 for (j = 0; j < sk_SSL_CIPHER_num(ciphers); j++) {
1012 c = sk_SSL_CIPHER_value(ciphers, j);
1059 /* Given ciphers and SSL_get_ciphers, we must pick a cipher */
1061 if (ciphers == NULL) {
1081 c = ssl3_choose_cipher(s, ciphers, ssl_get_cipher_preferences(s));
1116 * cipher_list - our prefered list of ciphers
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client.c759 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
763 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument
769 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
H A Dtlsv1_server.c655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client.c759 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
763 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument
769 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
H A Dtlsv1_server.c655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client.c759 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
763 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument
769 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_nl80211_capa.c259 u32 *ciphers; local
265 ciphers = nla_data(tb);
267 u32 c = ciphers[i];
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_nl80211_capa.c259 u32 *ciphers; local
265 ciphers = nla_data(tb);
267 u32 c = ciphers[i];
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_nl80211_capa.c259 u32 *ciphers; local
265 ciphers = nla_data(tb);
267 u32 c = ciphers[i];
/external/openssh/
H A Dssh.c801 options.ciphers = xstrdup(optarg);
813 options.ciphers = "3des-cbc";
815 options.ciphers = "blowfish-cbc";
817 options.ciphers = (char *)-1;
H A Dsshconnect2.c166 if (options.ciphers == (char *)-1) {
167 logit("No valid ciphers for protocol version 2 given, using defaults.");
168 options.ciphers = NULL;
170 if (options.ciphers != NULL) {
172 myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers;

Completed in 357 milliseconds

123