/external/webrtc/webrtc/p2p/base/ |
H A D | transportchannel.cc | 57 bool TransportChannel::SetSrtpCryptoSuites(const std::vector<int>& ciphers) { argument 62 bool TransportChannel::SetSrtpCiphers(const std::vector<std::string>& ciphers) { argument 64 for (const auto cipher : ciphers) {
|
H A D | dtlstransportchannel.cc | 283 LOG_J(LS_ERROR, this) << "Couldn't set DTLS-SRTP ciphers."; 295 const std::vector<int>& ciphers) { 296 if (srtp_ciphers_ == ciphers) 300 LOG(LS_WARNING) << "Ignoring new SRTP ciphers while DTLS is negotiating"; 305 // We don't support DTLS renegotiation currently. If new set of srtp ciphers 314 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher); 315 if (iter == ciphers.end()) { 317 for (size_t i = 0; i < ciphers.size(); ++i) { 319 requested_str.append(rtc::SrtpCryptoSuiteToName(ciphers[ 294 SetSrtpCryptoSuites( const std::vector<int>& ciphers) argument [all...] |
H A D | dtlstransportchannel_unittest.cc | 149 // SRTP ciphers will be set only in the beginning. 152 std::vector<int> ciphers; local 153 ciphers.push_back(rtc::SRTP_AES128_CM_SHA1_80); 154 ASSERT_TRUE((*it)->SetSrtpCryptoSuites(ciphers)); 469 // Check that we negotiated the right ciphers. 649 // Create two channels with DTLS 1.0 and check ciphers. 665 // Create two channels with DTLS 1.2 and check ciphers. 674 // Create two channels with DTLS 1.0 / DTLS 1.2 and check ciphers. 683 // Create two channels with DTLS 1.2 / DTLS 1.0 and check ciphers.
|
/external/conscrypt/benchmark-base/src/main/java/org/conscrypt/ |
H A D | ClientEndpoint.java | 36 String[] protocols, String[] ciphers) throws IOException { 40 socket.setEnabledCipherSuites(ciphers); 35 ClientEndpoint(SSLSocketFactory socketFactory, ChannelType channelType, int port, String[] protocols, String[] ciphers) argument
|
H A D | ClientSocketBenchmark.java | 61 ChannelType.CHANNEL, config.messageSize(), getProtocols(), ciphers(config)); 75 config.channelType(), server.port(), getProtocols(), ciphers(config)); 120 private String[] ciphers(Config config) { method in class:ClientSocketBenchmark
|
H A D | ServerSocketBenchmark.java | 63 channelType, config.messageSize(), getProtocols(), ciphers(config)); 81 ChannelType.CHANNEL, server.port(), getProtocols(), ciphers(config)); 134 private String[] ciphers(Config config) { method in class:ServerSocketBenchmark
|
H A D | SocketType.java | 25 String[] ciphers) throws IOException { 27 factories.clientFactory, channelType, port, protocols, ciphers); 31 String[] protocols, String[] ciphers) throws IOException { 33 channelType, messageSize, protocols, ciphers); 24 newClient(ChannelType channelType, int port, String[] protocols, String[] ciphers) argument 30 newServer(ChannelType channelType, int messageSize, String[] protocols, String[] ciphers) argument
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.c | 504 int ciphers, key_mgmt, res, version; local 666 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 668 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 669 if (!ciphers) { 685 if (ciphers & WPA_CIPHER_TKIP) { 726 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_none.c | 144 u8 *ciphers) 143 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
H A D | tls_internal.c | 648 u8 *ciphers) 652 return tlsv1_client_set_cipher_list(conn->client, ciphers); 656 return tlsv1_server_set_cipher_list(conn->server, ciphers); 647 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.c | 504 int ciphers, key_mgmt, res, version; local 666 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 668 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 669 if (!ciphers) { 685 if (ciphers & WPA_CIPHER_TKIP) { 726 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_none.c | 144 u8 *ciphers) 143 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
H A D | tls_internal.c | 648 u8 *ciphers) 652 return tlsv1_client_set_cipher_list(conn->client, ciphers); 656 return tlsv1_server_set_cipher_list(conn->server, ciphers); 647 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.c | 504 int ciphers, key_mgmt, res, version; local 666 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 668 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 669 if (!ciphers) { 685 if (ciphers & WPA_CIPHER_TKIP) { 726 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_none.c | 144 u8 *ciphers) 143 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
H A D | tls_internal.c | 648 u8 *ciphers) 652 return tlsv1_client_set_cipher_list(conn->client, ciphers); 656 return tlsv1_server_set_cipher_list(conn->server, ciphers); 647 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client.c | 758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument 768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
H A D | tlsv1_server.c | 655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument 665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client.c | 758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument 768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
H A D | tlsv1_server.c | 655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument 665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client.c | 758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument 768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
H A D | tlsv1_server.c | 655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument 665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/external/iw/ |
H A D | info.c | 297 __u32 *ciphers = nla_data(tb_msg[NL80211_ATTR_CIPHER_SUITES]); local 302 cipher_name(ciphers[i]));
|
/external/openssh/ |
H A D | cipher.c | 89 static const struct sshcipher ciphers[] = { variable in typeref:struct:sshcipher 145 /* Returns a comma-separated list of supported ciphers. */ 153 for (c = ciphers; c->name != NULL; c++) { 249 for (c = ciphers; c->name != NULL; c++) 259 for (c = ciphers; c->name != NULL; c++) 300 for (c = ciphers; c->name != NULL; c++)
|
/external/curl/lib/vtls/ |
H A D | gskit.c | 102 /* Supported ciphers. */ 310 } ciphers[CURL_GSKPROTO_LAST]; local 325 memset((char *) ciphers, 0, sizeof ciphers); 327 ciphers[i].buf = malloc(l); 328 if(!ciphers[i].buf) { 330 free(ciphers[i].buf); 333 ciphers[i].ptr = ciphers[i].buf; 334 *ciphers[ [all...] |