/external/boringssl/src/tool/ |
H A D | ciphers.cc | 30 fprintf(stderr, "Usage: bssl ciphers <cipher suite string>\n"); 44 STACK_OF(SSL_CIPHER) *ciphers = pref_list->ciphers; 47 for (size_t i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { 49 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i);
|
/external/webrtc/webrtc/p2p/base/ |
H A D | transportchannel.cc | 57 bool TransportChannel::SetSrtpCryptoSuites(const std::vector<int>& ciphers) { argument 62 bool TransportChannel::SetSrtpCiphers(const std::vector<std::string>& ciphers) { argument 64 for (const auto cipher : ciphers) {
|
H A D | dtlstransportchannel.cc | 283 LOG_J(LS_ERROR, this) << "Couldn't set DTLS-SRTP ciphers."; 295 const std::vector<int>& ciphers) { 296 if (srtp_ciphers_ == ciphers) 300 LOG(LS_WARNING) << "Ignoring new SRTP ciphers while DTLS is negotiating"; 305 // We don't support DTLS renegotiation currently. If new set of srtp ciphers 314 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher); 315 if (iter == ciphers.end()) { 317 for (size_t i = 0; i < ciphers.size(); ++i) { 319 requested_str.append(rtc::SrtpCryptoSuiteToName(ciphers[ 294 SetSrtpCryptoSuites( const std::vector<int>& ciphers) argument [all...] |
H A D | transportchannel.h | 111 // Sets up the ciphers to use for DTLS-SRTP. TODO(guoweis): Make this pure 113 virtual bool SetSrtpCryptoSuites(const std::vector<int>& ciphers); 117 virtual bool SetSrtpCiphers(const std::vector<std::string>& ciphers);
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 1489 int rsn_cipher_put_suites(u8 *start, int ciphers) argument 1493 if (ciphers & WPA_CIPHER_CCMP_256) { 1497 if (ciphers & WPA_CIPHER_GCMP_256) { 1501 if (ciphers & WPA_CIPHER_CCMP) { 1505 if (ciphers & WPA_CIPHER_GCMP) { 1509 if (ciphers & WPA_CIPHER_TKIP) { 1513 if (ciphers & WPA_CIPHER_NONE) { 1522 int wpa_cipher_put_suites(u8 *start, int ciphers) argument 1526 if (ciphers & WPA_CIPHER_CCMP) { 1530 if (ciphers 1543 wpa_pick_pairwise_cipher(int ciphers, int none_allowed) argument 1561 wpa_pick_group_cipher(int ciphers) argument 1632 wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim) argument [all...] |
H A D | wpa_common.h | 444 int rsn_cipher_put_suites(u8 *pos, int ciphers); 445 int wpa_cipher_put_suites(u8 *pos, int ciphers); 446 int wpa_pick_pairwise_cipher(int ciphers, int none_allowed); 447 int wpa_pick_group_cipher(int ciphers); 449 int wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim);
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 1489 int rsn_cipher_put_suites(u8 *start, int ciphers) argument 1493 if (ciphers & WPA_CIPHER_CCMP_256) { 1497 if (ciphers & WPA_CIPHER_GCMP_256) { 1501 if (ciphers & WPA_CIPHER_CCMP) { 1505 if (ciphers & WPA_CIPHER_GCMP) { 1509 if (ciphers & WPA_CIPHER_TKIP) { 1513 if (ciphers & WPA_CIPHER_NONE) { 1522 int wpa_cipher_put_suites(u8 *start, int ciphers) argument 1526 if (ciphers & WPA_CIPHER_CCMP) { 1530 if (ciphers 1543 wpa_pick_pairwise_cipher(int ciphers, int none_allowed) argument 1561 wpa_pick_group_cipher(int ciphers) argument 1632 wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim) argument [all...] |
H A D | wpa_common.h | 444 int rsn_cipher_put_suites(u8 *pos, int ciphers); 445 int wpa_cipher_put_suites(u8 *pos, int ciphers); 446 int wpa_pick_pairwise_cipher(int ciphers, int none_allowed); 447 int wpa_pick_group_cipher(int ciphers); 449 int wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim);
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 1489 int rsn_cipher_put_suites(u8 *start, int ciphers) argument 1493 if (ciphers & WPA_CIPHER_CCMP_256) { 1497 if (ciphers & WPA_CIPHER_GCMP_256) { 1501 if (ciphers & WPA_CIPHER_CCMP) { 1505 if (ciphers & WPA_CIPHER_GCMP) { 1509 if (ciphers & WPA_CIPHER_TKIP) { 1513 if (ciphers & WPA_CIPHER_NONE) { 1522 int wpa_cipher_put_suites(u8 *start, int ciphers) argument 1526 if (ciphers & WPA_CIPHER_CCMP) { 1530 if (ciphers 1543 wpa_pick_pairwise_cipher(int ciphers, int none_allowed) argument 1561 wpa_pick_group_cipher(int ciphers) argument 1632 wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim) argument [all...] |
H A D | wpa_common.h | 444 int rsn_cipher_put_suites(u8 *pos, int ciphers); 445 int wpa_cipher_put_suites(u8 *pos, int ciphers); 446 int wpa_pick_pairwise_cipher(int ciphers, int none_allowed); 447 int wpa_pick_group_cipher(int ciphers); 449 int wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim);
|
/external/curl/lib/vtls/ |
H A D | gskit.c | 98 /* Supported ciphers. */ 305 } ciphers[CURL_GSKPROTO_LAST]; local 320 memset((char *) ciphers, 0, sizeof ciphers); 322 ciphers[i].buf = malloc(l); 323 if(!ciphers[i].buf) { 325 free(ciphers[i].buf); 328 ciphers[i].ptr = ciphers[i].buf; 329 *ciphers[ [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_server.h | 37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
|
H A D | tlsv1_client.h | 41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_server.h | 37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
|
H A D | tlsv1_client.h | 41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_server.h | 37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
|
H A D | tlsv1_client.h | 41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
|
/external/srtp/crypto/ |
H A D | Makefile | 69 ciphers = cipher/cipher.o cipher/null_cipher.o \ macro 87 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(xfm)
|
/external/boringssl/src/ssl/ |
H A D | ssl_test.cc | 41 // The list of expected ciphers, in order, terminated with -1. 45 // Selecting individual ciphers should work. 62 // + reorders selected ciphers to the end, keeping their relative 81 // ! banishes ciphers from future selections. 104 // - removes selected ciphers, but preserves their order for future 153 // ciphers and only the selected ciphers. 158 // Order some ciphers backwards by strength. 179 // Exact ciphers may not be used in multi-part rules; they are treated 295 for (size_t i = 0; i < sk_SSL_CIPHER_num(list->ciphers); [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_none.c | 138 u8 *ciphers) 137 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_none.c | 138 u8 *ciphers) 137 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_none.c | 138 u8 *ciphers) 137 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/srtp/ |
H A D | Makefile | 75 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \ macro 96 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(replay)
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.c | 480 int ciphers, key_mgmt, res, version; local 618 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 620 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 621 if (!ciphers) { 637 if (ciphers & WPA_CIPHER_TKIP) { 674 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.c | 480 int ciphers, key_mgmt, res, version; local 618 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 620 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 621 if (!ciphers) { 637 if (ciphers & WPA_CIPHER_TKIP) { 674 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|