Searched refs:cipher_suite (Results 1 - 25 of 59) sorted by relevance

123

/external/webrtc/talk/media/base/
H A Dcryptoparams.h42 : tag(t), cipher_suite(cs), key_params(kp), session_params(sp) {}
45 return (tag == params.tag && cipher_suite == params.cipher_suite);
49 std::string cipher_suite; member in struct:cricket::CryptoParams
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
H A DServerHelloTest.java33 CipherSuite cipher_suite = CipherSuite.TLS_DH_DSS_WITH_DES_CBC_SHA;
36 server_version, session_id, cipher_suite, (byte) 0);
44 assertEquals("incorrect CertificateRequest", cipher_suite,
45 message.cipher_suite);
63 assertEquals("incorrect message decoding", message.cipher_suite,
64 message_2.cipher_suite);
H A DClientHelloTest.java40 CipherSuite[] cipher_suite = new CipherSuite[] {
43 ses_id, cipher_suite);
H A DServerHandshakeImplTest.java68 CipherSuite[] cipher_suite = new CipherSuite[] {
71 ses_id, cipher_suite);
/external/libmicrohttpd/src/testcurl/https/
H A Dtls_test_common.h54 const char *cipher_suite; member in struct:https_test_data
84 const char *cipher_suite, int proto_version,
113 send_curl_req (char *url, struct CBC *cbc, const char *cipher_suite,
117 test_https_transfer (void *cls, const char *cipher_suite, int proto_version);
138 (*test_function) (void * cls, const char *cipher_suite,
140 int daemon_flags, const char *cipher_suite, int proto_version, ...);
H A Dtest_https_get.c43 const char *cipher_suite,
62 ret = test_https_transfer (test_fd, cipher_suite, proto_version);
72 const char *cipher_suite,
91 ret = test_https_transfer (test_fd, cipher_suite, proto_version);
42 test_cipher_option(FILE * test_fd, const char *cipher_suite, int proto_version) argument
71 test_secure_get(FILE * test_fd, const char *cipher_suite, int proto_version) argument
H A Dtest_https_get_parallel_threads.c65 cargs->cipher_suite, cargs->proto_version);
79 test_single_client (void *cls, const char *cipher_suite, argument
84 { NULL, cipher_suite, curl_proto_version };
101 test_parallel_clients (void *cls, const char *cipher_suite, argument
109 { NULL, cipher_suite, curl_proto_version };
H A Dtest_https_multi_daemon.c45 const char *cipher_suite,
81 test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0);
83 test_daemon_get (NULL, cipher_suite, proto_version,
88 test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0);
44 test_concurent_daemon_pair(void *cls, const char *cipher_suite, int proto_version) argument
H A Dtest_https_get_parallel.c64 cargs->cipher_suite, cargs->proto_version);
79 test_single_client (void *cls, const char *cipher_suite, argument
84 { NULL, cipher_suite, curl_proto_version };
101 test_parallel_clients (void * cls, const char *cipher_suite, argument
109 { NULL, cipher_suite, curl_proto_version };
H A Dtest_tls_authentication.c47 test_secure_get (void * cls, char *cipher_suite, int proto_version) argument
65 ret = test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0);
H A Dtest_tls_options.c44 test_unmatching_ssl_version (void * cls, const char *cipher_suite, argument
67 send_curl_req (url, &cbc, cipher_suite, curl_req_ssl_version))
H A Dtls_test_common.c67 const char *cipher_suite, int proto_version,
102 curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, cipher_suite);
204 * @param cipher_suite
210 send_curl_req (char *url, struct CBC * cbc, const char *cipher_suite, argument
232 curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, cipher_suite);
316 test_https_transfer (void *cls, const char *cipher_suite, int proto_version) argument
338 if (CURLE_OK != send_curl_req (url, &cbc, cipher_suite, proto_version))
452 (*test_function) (void * cls, const char *cipher_suite,
454 int daemon_flags, const char *cipher_suite, int proto_version, ...)
470 ret = test_function (NULL, cipher_suite, proto_versio
66 test_daemon_get(void *cls, const char *cipher_suite, int proto_version, int port, int ver_peer) argument
451 test_wrap(const char *test_name, int (*test_function) (void * cls, const char *cipher_suite, int proto_version), void * cls, int daemon_flags, const char *cipher_suite, int proto_version, ...) argument
[all...]
/external/webrtc/webrtc/base/
H A Dsslstreamadapter.cc57 bool SSLStreamAdapter::GetSslCipherSuite(int* cipher_suite) { argument
94 std::string SSLStreamAdapter::SslCipherSuiteToName(int cipher_suite) { argument
95 return OpenSSLStreamAdapter::SslCipherSuiteToName(cipher_suite);
H A Dsslstreamadapter.h162 virtual bool GetSslCipherSuite(int* cipher_suite);
201 static std::string SslCipherSuiteToName(int cipher_suite);
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_record.h51 u16 cipher_suite; member in struct:tlsv1_record_layer
61 u16 cipher_suite);
H A Dtlsv1_record.c22 * @cipher_suite: New cipher suite
31 u16 cipher_suite)
37 cipher_suite);
38 rl->cipher_suite = cipher_suite;
40 suite = tls_get_cipher_suite(cipher_suite);
78 "0x%04x", rl->cipher_suite);
79 rl->write_cipher_suite = rl->cipher_suite;
112 "0x%04x", rl->cipher_suite);
113 rl->read_cipher_suite = rl->cipher_suite;
30 tlsv1_record_set_cipher_suite(struct tlsv1_record_layer *rl, u16 cipher_suite) argument
[all...]
H A Dtlsv1_server_i.h41 u16 cipher_suite; member in struct:tlsv1_server
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_record.h51 u16 cipher_suite; member in struct:tlsv1_record_layer
61 u16 cipher_suite);
H A Dtlsv1_record.c22 * @cipher_suite: New cipher suite
31 u16 cipher_suite)
37 cipher_suite);
38 rl->cipher_suite = cipher_suite;
40 suite = tls_get_cipher_suite(cipher_suite);
78 "0x%04x", rl->cipher_suite);
79 rl->write_cipher_suite = rl->cipher_suite;
112 "0x%04x", rl->cipher_suite);
113 rl->read_cipher_suite = rl->cipher_suite;
30 tlsv1_record_set_cipher_suite(struct tlsv1_record_layer *rl, u16 cipher_suite) argument
[all...]
H A Dtlsv1_server_i.h41 u16 cipher_suite; member in struct:tlsv1_server
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_record.h51 u16 cipher_suite; member in struct:tlsv1_record_layer
61 u16 cipher_suite);
H A Dtlsv1_record.c22 * @cipher_suite: New cipher suite
31 u16 cipher_suite)
37 cipher_suite);
38 rl->cipher_suite = cipher_suite;
40 suite = tls_get_cipher_suite(cipher_suite);
78 "0x%04x", rl->cipher_suite);
79 rl->write_cipher_suite = rl->cipher_suite;
112 "0x%04x", rl->cipher_suite);
113 rl->read_cipher_suite = rl->cipher_suite;
30 tlsv1_record_set_cipher_suite(struct tlsv1_record_layer *rl, u16 cipher_suite) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_cp.c48 u8 *cipher_suite; member in struct:ieee802_1x_cp_sm
100 os_memcmp(sm->current_cipher_suite, sm->cipher_suite,
200 os_memcpy(sm->current_cipher_suite, sm->cipher_suite, CS_ID_LEN);
463 sm->cipher_suite = os_zalloc(CS_ID_LEN);
465 if (!sm->cipher_suite || !sm->current_cipher_suite) {
467 os_free(sm->cipher_suite);
473 os_memcpy(sm->cipher_suite, default_cs_id, CS_ID_LEN);
533 os_free(sm->cipher_suite);
624 os_memcpy(sm->cipher_suite, pid, CS_ID_LEN);
/external/wpa_supplicant_8/src/pae/
H A Dieee802_1x_cp.c48 u8 *cipher_suite; member in struct:ieee802_1x_cp_sm
100 os_memcmp(sm->current_cipher_suite, sm->cipher_suite,
200 os_memcpy(sm->current_cipher_suite, sm->cipher_suite, CS_ID_LEN);
463 sm->cipher_suite = os_zalloc(CS_ID_LEN);
465 if (!sm->cipher_suite || !sm->current_cipher_suite) {
467 os_free(sm->cipher_suite);
473 os_memcpy(sm->cipher_suite, default_cs_id, CS_ID_LEN);
533 os_free(sm->cipher_suite);
624 os_memcpy(sm->cipher_suite, pid, CS_ID_LEN);
/external/wpa_supplicant_8/wpa_supplicant/src/pae/
H A Dieee802_1x_cp.c48 u8 *cipher_suite; member in struct:ieee802_1x_cp_sm
100 os_memcmp(sm->current_cipher_suite, sm->cipher_suite,
200 os_memcpy(sm->current_cipher_suite, sm->cipher_suite, CS_ID_LEN);
463 sm->cipher_suite = os_zalloc(CS_ID_LEN);
465 if (!sm->cipher_suite || !sm->current_cipher_suite) {
467 os_free(sm->cipher_suite);
473 os_memcpy(sm->cipher_suite, default_cs_id, CS_ID_LEN);
533 os_free(sm->cipher_suite);
624 os_memcpy(sm->cipher_suite, pid, CS_ID_LEN);

Completed in 429 milliseconds

123