/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.c | 462 int ciphers, key_mgmt, res, version; local 600 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 602 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 603 if (!ciphers) { 619 if (ciphers & WPA_CIPHER_TKIP) { 656 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.c | 462 int ciphers, key_mgmt, res, version; local 600 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 602 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 603 if (!ciphers) { 619 if (ciphers & WPA_CIPHER_TKIP) { 656 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.c | 462 int ciphers, key_mgmt, res, version; local 600 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 602 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 603 if (!ciphers) { 619 if (ciphers & WPA_CIPHER_TKIP) { 656 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls.h | 460 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 466 u8 *ciphers);
|
H A D | tls_openssl.c | 740 const char *ciphers; local 834 ciphers = conf->openssl_ciphers; 836 ciphers = "DEFAULT:!EXP:!LOW"; 837 if (SSL_CTX_set_cipher_list(ssl, ciphers) != 1) { 840 ciphers); 3068 u8 *ciphers) 3074 if (conn == NULL || conn->ssl == NULL || ciphers == NULL) 3081 c = ciphers; 3067 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls.h | 460 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 466 u8 *ciphers);
|
H A D | tls_openssl.c | 740 const char *ciphers; local 834 ciphers = conf->openssl_ciphers; 836 ciphers = "DEFAULT:!EXP:!LOW"; 837 if (SSL_CTX_set_cipher_list(ssl, ciphers) != 1) { 840 ciphers); 3068 u8 *ciphers) 3074 if (conn == NULL || conn->ssl == NULL || ciphers == NULL) 3081 c = ciphers; 3067 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls.h | 460 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 466 u8 *ciphers);
|
H A D | tls_openssl.c | 740 const char *ciphers; local 834 ciphers = conf->openssl_ciphers; 836 ciphers = "DEFAULT:!EXP:!LOW"; 837 if (SSL_CTX_set_cipher_list(ssl, ciphers) != 1) { 840 ciphers); 3068 u8 *ciphers) 3074 if (conn == NULL || conn->ssl == NULL || ciphers == NULL) 3081 c = ciphers; 3067 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/libvncserver/webclients/java-applet/ssl/ |
H A D | ss_vncviewer | 212 ciphers="" 276 "-anondh") ciphers="ciphers=$anondh" 281 "-ciphers") shift; ciphers="ciphers=$1" 3153 if [ "X$ciphers" != "X" ]; then 3154 cipher_args=`echo "$ciphers" | sed -e 's/ciphers=/-cipher /'` 3455 $ciphers [all...] |
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/ |
H A D | ss_vncviewer | 212 ciphers="" 276 "-anondh") ciphers="ciphers=$anondh" 281 "-ciphers") shift; ciphers="ciphers=$1" 3120 if [ "X$ciphers" != "X" ]; then 3121 cipher_args=`echo "$ciphers" | sed -e 's/ciphers=/-cipher /'` 3418 $ciphers [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast.c | 1446 u8 ciphers[5]; local 1452 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA; 1458 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA; 1459 ciphers[count++] = TLS_CIPHER_AES128_SHA; 1460 ciphers[count++] = TLS_CIPHER_RC4_SHA; 1463 ciphers[count++] = TLS_CIPHER_NONE; 1466 ciphers)) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_fast.c | 1446 u8 ciphers[5]; local 1452 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA; 1458 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA; 1459 ciphers[count++] = TLS_CIPHER_AES128_SHA; 1460 ciphers[count++] = TLS_CIPHER_RC4_SHA; 1463 ciphers[count++] = TLS_CIPHER_NONE; 1466 ciphers)) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast.c | 1446 u8 ciphers[5]; local 1452 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA; 1458 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA; 1459 ciphers[count++] = TLS_CIPHER_AES128_SHA; 1460 ciphers[count++] = TLS_CIPHER_RC4_SHA; 1463 ciphers[count++] = TLS_CIPHER_NONE; 1466 ciphers)) {
|
/external/boringssl/src/ssl/ |
H A D | s3_srvr.c | 776 /* Skip SSLv2 ciphers. */ 813 STACK_OF(SSL_CIPHER) *ciphers = NULL; 1000 ciphers = ssl_bytes_to_cipher_list(s, &cipher_suites); 1001 if (ciphers == NULL) { 1011 for (j = 0; j < sk_SSL_CIPHER_num(ciphers); j++) { 1012 c = sk_SSL_CIPHER_value(ciphers, j); 1059 /* Given ciphers and SSL_get_ciphers, we must pick a cipher */ 1061 if (ciphers == NULL) { 1081 c = ssl3_choose_cipher(s, ciphers, ssl_get_cipher_preferences(s)); 1116 * cipher_list - our prefered list of ciphers [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client.c | 759 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 763 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument 769 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
H A D | tlsv1_server.c | 655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument 665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client.c | 759 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 763 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument 769 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
H A D | tlsv1_server.c | 655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument 665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client.c | 759 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 763 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument 769 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211_capa.c | 259 u32 *ciphers; local 265 ciphers = nla_data(tb); 267 u32 c = ciphers[i];
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211_capa.c | 259 u32 *ciphers; local 265 ciphers = nla_data(tb); 267 u32 c = ciphers[i];
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211_capa.c | 259 u32 *ciphers; local 265 ciphers = nla_data(tb); 267 u32 c = ciphers[i];
|
/external/openssh/ |
H A D | ssh.c | 801 options.ciphers = xstrdup(optarg); 813 options.ciphers = "3des-cbc"; 815 options.ciphers = "blowfish-cbc"; 817 options.ciphers = (char *)-1;
|
H A D | sshconnect2.c | 166 if (options.ciphers == (char *)-1) { 167 logit("No valid ciphers for protocol version 2 given, using defaults."); 168 options.ciphers = NULL; 170 if (options.ciphers != NULL) { 172 myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers;
|