/external/conscrypt/benchmark-base/src/main/java/org/conscrypt/ |
H A D | EndpointFactory.java | 10 String[] ciphers) throws IOException; 13 String[] protocols, String[] ciphers) throws IOException; 9 newClient(ChannelType channelType, int port, String[] protocols, String[] ciphers) argument 12 newServer(ChannelType channelType, int messageSize, String[] protocols, String[] ciphers) argument
|
H A D | ClientEndpoint.java | 40 String[] protocols, String[] ciphers) throws IOException { 43 socket.setEnabledCipherSuites(ciphers); 39 ClientEndpoint(SSLSocketFactory socketFactory, ChannelType channelType, int port, String[] protocols, String[] ciphers) argument
|
H A D | ClientSocketBenchmark.java | 62 ChannelType.CHANNEL, config.messageSize(), getProtocols(), ciphers(config)); 76 config.channelType(), server.port(), getProtocols(), ciphers(config)); 143 private String[] ciphers(Config config) { method in class:ClientSocketBenchmark
|
H A D | ServerSocketBenchmark.java | 65 channelType, config.messageSize(), getProtocols(), ciphers(config)); 89 ChannelType.CHANNEL, server.port(), getProtocols(), ciphers(config)); 146 private String[] ciphers(Config config) { method in class:ServerSocketBenchmark
|
/external/webrtc/webrtc/p2p/base/ |
H A D | transportchannel.cc | 57 bool TransportChannel::SetSrtpCryptoSuites(const std::vector<int>& ciphers) { argument 62 bool TransportChannel::SetSrtpCiphers(const std::vector<std::string>& ciphers) { argument 64 for (const auto cipher : ciphers) {
|
H A D | dtlstransportchannel.cc | 283 LOG_J(LS_ERROR, this) << "Couldn't set DTLS-SRTP ciphers."; 295 const std::vector<int>& ciphers) { 296 if (srtp_ciphers_ == ciphers) 300 LOG(LS_WARNING) << "Ignoring new SRTP ciphers while DTLS is negotiating"; 305 // We don't support DTLS renegotiation currently. If new set of srtp ciphers 314 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher); 315 if (iter == ciphers.end()) { 317 for (size_t i = 0; i < ciphers.size(); ++i) { 319 requested_str.append(rtc::SrtpCryptoSuiteToName(ciphers[ 294 SetSrtpCryptoSuites( const std::vector<int>& ciphers) argument [all...] |
H A D | dtlstransportchannel_unittest.cc | 149 // SRTP ciphers will be set only in the beginning. 152 std::vector<int> ciphers; local 153 ciphers.push_back(rtc::SRTP_AES128_CM_SHA1_80); 154 ASSERT_TRUE((*it)->SetSrtpCryptoSuites(ciphers)); 469 // Check that we negotiated the right ciphers. 649 // Create two channels with DTLS 1.0 and check ciphers. 665 // Create two channels with DTLS 1.2 and check ciphers. 674 // Create two channels with DTLS 1.0 / DTLS 1.2 and check ciphers. 683 // Create two channels with DTLS 1.2 / DTLS 1.0 and check ciphers.
|
/external/conscrypt/benchmark-android/src/main/java/org/conscrypt/ |
H A D | AndroidEndpointFactory.java | 26 String[] ciphers) throws IOException { 28 factories.clientFactory, channelType, port, protocols, ciphers); 33 String[] protocols, String[] ciphers) throws IOException { 35 channelType, messageSize, protocols, ciphers); 25 newClient(ChannelType channelType, int port, String[] protocols, String[] ciphers) argument 32 newServer(ChannelType channelType, int messageSize, String[] protocols, String[] ciphers) argument
|
/external/conscrypt/benchmark-jmh/src/jmh/java/org/conscrypt/ |
H A D | OpenJdkEndpointFactory.java | 28 String[] ciphers) throws IOException { 30 factories.clientFactory, channelType, port, protocols, ciphers); 35 String[] protocols, String[] ciphers) throws IOException { 37 channelType, messageSize, protocols, ciphers); 27 newClient(ChannelType channelType, int port, String[] protocols, String[] ciphers) argument 34 newServer(ChannelType channelType, int messageSize, String[] protocols, String[] ciphers) argument
|
/external/conscrypt/openjdk/src/test/java/org/conscrypt/ |
H A D | RenegotiationTest.java | 228 private final Set<String> ciphers = new LinkedHashSet<String>(Arrays.asList(CIPHERS)); field in class:RenegotiationTest.Server 326 ciphers.remove(currentCipher); 327 engine.setEnabledCipherSuites(ciphers.toArray(new String[ciphers.size()]));
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.c | 517 int ciphers, key_mgmt, res, version; local 695 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 697 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 698 if (!ciphers) { 714 if (ciphers & WPA_CIPHER_TKIP) { 768 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_none.c | 144 u8 *ciphers) 143 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.c | 517 int ciphers, key_mgmt, res, version; local 695 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 697 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 698 if (!ciphers) { 714 if (ciphers & WPA_CIPHER_TKIP) { 768 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_none.c | 144 u8 *ciphers) 143 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.c | 517 int ciphers, key_mgmt, res, version; local 695 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 697 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 698 if (!ciphers) { 714 if (ciphers & WPA_CIPHER_TKIP) { 768 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_none.c | 144 u8 *ciphers) 143 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/external/conscrypt/testing/src/main/java/org/conscrypt/ |
H A D | TestUtils.java | 295 private static void filterCiphers(Iterable<String> ciphers) { argument 296 // Filter all non-TLS ciphers. 297 Iterator<String> iter = ciphers.iterator();
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client.c | 758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument 768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
H A D | tlsv1_server.c | 655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument 665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client.c | 758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument 768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
H A D | tlsv1_server.c | 655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument 665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client.c | 758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument 768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
H A D | tlsv1_server.c | 655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument 665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
/external/curl/lib/vtls/ |
H A D | cyassl.c | 155 char *ciphers; local 256 ciphers = SSL_CONN_CONFIG(cipher_list); 257 if(ciphers) { 258 if(!SSL_CTX_set_cipher_list(BACKEND->ctx, ciphers)) { 259 failf(data, "failed setting cipher list: %s", ciphers); 262 infof(data, "Cipher selection: %s\n", ciphers);
|
/external/iw/ |
H A D | info.c | 297 __u32 *ciphers = nla_data(tb_msg[NL80211_ATTR_CIPHER_SUITES]); local 302 cipher_name(ciphers[i]));
|