Searched defs:ciphers (Results 1 - 25 of 58) sorted by relevance

123

/external/webrtc/webrtc/p2p/base/
H A Dtransportchannel.cc57 bool TransportChannel::SetSrtpCryptoSuites(const std::vector<int>& ciphers) { argument
62 bool TransportChannel::SetSrtpCiphers(const std::vector<std::string>& ciphers) { argument
64 for (const auto cipher : ciphers) {
H A Ddtlstransportchannel.cc283 LOG_J(LS_ERROR, this) << "Couldn't set DTLS-SRTP ciphers.";
295 const std::vector<int>& ciphers) {
296 if (srtp_ciphers_ == ciphers)
300 LOG(LS_WARNING) << "Ignoring new SRTP ciphers while DTLS is negotiating";
305 // We don't support DTLS renegotiation currently. If new set of srtp ciphers
314 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher);
315 if (iter == ciphers.end()) {
317 for (size_t i = 0; i < ciphers.size(); ++i) {
319 requested_str.append(rtc::SrtpCryptoSuiteToName(ciphers[
294 SetSrtpCryptoSuites( const std::vector<int>& ciphers) argument
[all...]
H A Ddtlstransportchannel_unittest.cc149 // SRTP ciphers will be set only in the beginning.
152 std::vector<int> ciphers; local
153 ciphers.push_back(rtc::SRTP_AES128_CM_SHA1_80);
154 ASSERT_TRUE((*it)->SetSrtpCryptoSuites(ciphers));
469 // Check that we negotiated the right ciphers.
649 // Create two channels with DTLS 1.0 and check ciphers.
665 // Create two channels with DTLS 1.2 and check ciphers.
674 // Create two channels with DTLS 1.0 / DTLS 1.2 and check ciphers.
683 // Create two channels with DTLS 1.2 / DTLS 1.0 and check ciphers.
/external/conscrypt/benchmark-base/src/main/java/org/conscrypt/
H A DClientEndpoint.java36 String[] protocols, String[] ciphers) throws IOException {
40 socket.setEnabledCipherSuites(ciphers);
35 ClientEndpoint(SSLSocketFactory socketFactory, ChannelType channelType, int port, String[] protocols, String[] ciphers) argument
H A DClientSocketBenchmark.java61 ChannelType.CHANNEL, config.messageSize(), getProtocols(), ciphers(config));
75 config.channelType(), server.port(), getProtocols(), ciphers(config));
120 private String[] ciphers(Config config) { method in class:ClientSocketBenchmark
H A DServerSocketBenchmark.java63 channelType, config.messageSize(), getProtocols(), ciphers(config));
81 ChannelType.CHANNEL, server.port(), getProtocols(), ciphers(config));
134 private String[] ciphers(Config config) { method in class:ServerSocketBenchmark
H A DSocketType.java25 String[] ciphers) throws IOException {
27 factories.clientFactory, channelType, port, protocols, ciphers);
31 String[] protocols, String[] ciphers) throws IOException {
33 channelType, messageSize, protocols, ciphers);
24 newClient(ChannelType channelType, int port, String[] protocols, String[] ciphers) argument
30 newServer(ChannelType channelType, int messageSize, String[] protocols, String[] ciphers) argument
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth_ie.c504 int ciphers, key_mgmt, res, version; local
666 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
668 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
669 if (!ciphers) {
685 if (ciphers & WPA_CIPHER_TKIP) {
726 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_none.c144 u8 *ciphers)
143 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls_internal.c648 u8 *ciphers)
652 return tlsv1_client_set_cipher_list(conn->client, ciphers);
656 return tlsv1_server_set_cipher_list(conn->server, ciphers);
647 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth_ie.c504 int ciphers, key_mgmt, res, version; local
666 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
668 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
669 if (!ciphers) {
685 if (ciphers & WPA_CIPHER_TKIP) {
726 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
/external/wpa_supplicant_8/src/crypto/
H A Dtls_none.c144 u8 *ciphers)
143 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls_internal.c648 u8 *ciphers)
652 return tlsv1_client_set_cipher_list(conn->client, ciphers);
656 return tlsv1_server_set_cipher_list(conn->server, ciphers);
647 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth_ie.c504 int ciphers, key_mgmt, res, version; local
666 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
668 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
669 if (!ciphers) {
685 if (ciphers & WPA_CIPHER_TKIP) {
726 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_none.c144 u8 *ciphers)
143 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls_internal.c648 u8 *ciphers)
652 return tlsv1_client_set_cipher_list(conn->client, ciphers);
656 return tlsv1_server_set_cipher_list(conn->server, ciphers);
647 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client.c758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument
768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
H A Dtlsv1_server.c655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client.c758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument
768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
H A Dtlsv1_server.c655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client.c758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument
768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
H A Dtlsv1_server.c655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
/external/iw/
H A Dinfo.c297 __u32 *ciphers = nla_data(tb_msg[NL80211_ATTR_CIPHER_SUITES]); local
302 cipher_name(ciphers[i]));
/external/openssh/
H A Dcipher.c89 static const struct sshcipher ciphers[] = { variable in typeref:struct:sshcipher
145 /* Returns a comma-separated list of supported ciphers. */
153 for (c = ciphers; c->name != NULL; c++) {
249 for (c = ciphers; c->name != NULL; c++)
259 for (c = ciphers; c->name != NULL; c++)
300 for (c = ciphers; c->name != NULL; c++)
/external/curl/lib/vtls/
H A Dgskit.c102 /* Supported ciphers. */
310 } ciphers[CURL_GSKPROTO_LAST]; local
325 memset((char *) ciphers, 0, sizeof ciphers);
327 ciphers[i].buf = malloc(l);
328 if(!ciphers[i].buf) {
330 free(ciphers[i].buf);
333 ciphers[i].ptr = ciphers[i].buf;
334 *ciphers[
[all...]

Completed in 3086 milliseconds

123