Searched defs:ciphers (Results 1 - 25 of 59) sorted by relevance

123

/external/conscrypt/benchmark-base/src/main/java/org/conscrypt/
H A DEndpointFactory.java10 String[] ciphers) throws IOException;
13 String[] protocols, String[] ciphers) throws IOException;
9 newClient(ChannelType channelType, int port, String[] protocols, String[] ciphers) argument
12 newServer(ChannelType channelType, int messageSize, String[] protocols, String[] ciphers) argument
H A DClientEndpoint.java40 String[] protocols, String[] ciphers) throws IOException {
43 socket.setEnabledCipherSuites(ciphers);
39 ClientEndpoint(SSLSocketFactory socketFactory, ChannelType channelType, int port, String[] protocols, String[] ciphers) argument
H A DClientSocketBenchmark.java62 ChannelType.CHANNEL, config.messageSize(), getProtocols(), ciphers(config));
76 config.channelType(), server.port(), getProtocols(), ciphers(config));
143 private String[] ciphers(Config config) { method in class:ClientSocketBenchmark
H A DServerSocketBenchmark.java65 channelType, config.messageSize(), getProtocols(), ciphers(config));
89 ChannelType.CHANNEL, server.port(), getProtocols(), ciphers(config));
146 private String[] ciphers(Config config) { method in class:ServerSocketBenchmark
/external/webrtc/webrtc/p2p/base/
H A Dtransportchannel.cc57 bool TransportChannel::SetSrtpCryptoSuites(const std::vector<int>& ciphers) { argument
62 bool TransportChannel::SetSrtpCiphers(const std::vector<std::string>& ciphers) { argument
64 for (const auto cipher : ciphers) {
H A Ddtlstransportchannel.cc283 LOG_J(LS_ERROR, this) << "Couldn't set DTLS-SRTP ciphers.";
295 const std::vector<int>& ciphers) {
296 if (srtp_ciphers_ == ciphers)
300 LOG(LS_WARNING) << "Ignoring new SRTP ciphers while DTLS is negotiating";
305 // We don't support DTLS renegotiation currently. If new set of srtp ciphers
314 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher);
315 if (iter == ciphers.end()) {
317 for (size_t i = 0; i < ciphers.size(); ++i) {
319 requested_str.append(rtc::SrtpCryptoSuiteToName(ciphers[
294 SetSrtpCryptoSuites( const std::vector<int>& ciphers) argument
[all...]
H A Ddtlstransportchannel_unittest.cc149 // SRTP ciphers will be set only in the beginning.
152 std::vector<int> ciphers; local
153 ciphers.push_back(rtc::SRTP_AES128_CM_SHA1_80);
154 ASSERT_TRUE((*it)->SetSrtpCryptoSuites(ciphers));
469 // Check that we negotiated the right ciphers.
649 // Create two channels with DTLS 1.0 and check ciphers.
665 // Create two channels with DTLS 1.2 and check ciphers.
674 // Create two channels with DTLS 1.0 / DTLS 1.2 and check ciphers.
683 // Create two channels with DTLS 1.2 / DTLS 1.0 and check ciphers.
/external/conscrypt/benchmark-android/src/main/java/org/conscrypt/
H A DAndroidEndpointFactory.java26 String[] ciphers) throws IOException {
28 factories.clientFactory, channelType, port, protocols, ciphers);
33 String[] protocols, String[] ciphers) throws IOException {
35 channelType, messageSize, protocols, ciphers);
25 newClient(ChannelType channelType, int port, String[] protocols, String[] ciphers) argument
32 newServer(ChannelType channelType, int messageSize, String[] protocols, String[] ciphers) argument
/external/conscrypt/benchmark-jmh/src/jmh/java/org/conscrypt/
H A DOpenJdkEndpointFactory.java28 String[] ciphers) throws IOException {
30 factories.clientFactory, channelType, port, protocols, ciphers);
35 String[] protocols, String[] ciphers) throws IOException {
37 channelType, messageSize, protocols, ciphers);
27 newClient(ChannelType channelType, int port, String[] protocols, String[] ciphers) argument
34 newServer(ChannelType channelType, int messageSize, String[] protocols, String[] ciphers) argument
/external/conscrypt/openjdk/src/test/java/org/conscrypt/
H A DRenegotiationTest.java228 private final Set<String> ciphers = new LinkedHashSet<String>(Arrays.asList(CIPHERS)); field in class:RenegotiationTest.Server
326 ciphers.remove(currentCipher);
327 engine.setEnabledCipherSuites(ciphers.toArray(new String[ciphers.size()]));
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth_ie.c517 int ciphers, key_mgmt, res, version; local
695 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
697 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
698 if (!ciphers) {
714 if (ciphers & WPA_CIPHER_TKIP) {
768 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_none.c144 u8 *ciphers)
143 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth_ie.c517 int ciphers, key_mgmt, res, version; local
695 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
697 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
698 if (!ciphers) {
714 if (ciphers & WPA_CIPHER_TKIP) {
768 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
/external/wpa_supplicant_8/src/crypto/
H A Dtls_none.c144 u8 *ciphers)
143 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth_ie.c517 int ciphers, key_mgmt, res, version; local
695 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
697 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
698 if (!ciphers) {
714 if (ciphers & WPA_CIPHER_TKIP) {
768 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_none.c144 u8 *ciphers)
143 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/external/conscrypt/testing/src/main/java/org/conscrypt/
H A DTestUtils.java295 private static void filterCiphers(Iterable<String> ciphers) { argument
296 // Filter all non-TLS ciphers.
297 Iterator<String> iter = ciphers.iterator();
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client.c758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument
768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
H A Dtlsv1_server.c655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client.c758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument
768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
H A Dtlsv1_server.c655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client.c758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument
768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
H A Dtlsv1_server.c655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
/external/curl/lib/vtls/
H A Dcyassl.c155 char *ciphers; local
256 ciphers = SSL_CONN_CONFIG(cipher_list);
257 if(ciphers) {
258 if(!SSL_CTX_set_cipher_list(BACKEND->ctx, ciphers)) {
259 failf(data, "failed setting cipher list: %s", ciphers);
262 infof(data, "Cipher selection: %s\n", ciphers);
/external/iw/
H A Dinfo.c297 __u32 *ciphers = nla_data(tb_msg[NL80211_ATTR_CIPHER_SUITES]); local
302 cipher_name(ciphers[i]));

Completed in 461 milliseconds

123