/external/apache-harmony/x-net/src/test/impl/java/org/apache/harmony/xnet/tests/provider/jsse/ |
DigitalSignatureTest.java | 119 // CipherSuite.KeyExchange_RSA_EXPORT == 2
|
/external/chromium/net/base/ |
ssl_config_service.h | 50 // Though cipher suites are sent in TLS as "uint8 CipherSuite[2]", in
|
/external/chromium_org/third_party/tlslite/tlslite/ |
HandshakeSettings.py | 36 choose whichever ciphersuite matches the earliest entry in this
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.h | 49 /* CipherSuite */
|
tlsv1_client_read.c | 120 /* CipherSuite cipher_suite */ 147 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
|
tlsv1_server_read.c | 125 /* CipherSuite cipher_suites<2..2^16-1> */ 160 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pwd.c | 315 * peer_scalar | ciphersuite) 382 /* ciphersuite */ 745 /* build up the ciphersuite: group | random_function | prf */ 763 * server_scalar | ciphersuite) 824 /* ciphersuite */
|
eap_server_pax.c | 19 * TODO: Add support with PAX_SEC with the mandatory to implement ciphersuite 21 * recommended ciphersuite (HMAC_SHA256_128, IANA DH Group 15 (3072 bits),
|
eap_server_gpsk.c | 371 "ciphersuite %d:%d",
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_gpsk_common.c | 19 * eap_gpsk_supported_ciphersuite - Check whether ciphersuite is supported 22 * Returns: 1 if ciphersuite is support, or 0 if not
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_pax.c | 19 * TODO: Add support with PAX_SEC with the mandatory to implement ciphersuite 21 * recommended ciphersuite (HMAC_SHA256_128, IANA DH Group 15 (3072 bits),
|
eap_gpsk.c | 207 "ciphersuite found"); 210 wpa_printf(MSG_DEBUG, "EAP-GPSK: Selected ciphersuite %d:%d",
|
/external/chromium_org/net/ssl/ |
ssl_config_service.h | 92 // Though cipher suites are sent in TLS as "uint8 CipherSuite[2]", in
|
/external/chromium_org/third_party/tlslite/patches/ |
ca_request.patch | 73 sessionID, cipherSuite, certificateType))
|
/libcore/crypto/src/main/java/org/conscrypt/ |
OpenSSLSocketImpl.java | 221 String cipherSuite = session.getCipherSuite(); 224 if (cipherSuite.equals(enabledCipherSuite)) { 296 String keyType = CipherSuite.getByName(enabledCipherSuite).getServerKeyType(); 532 keyTypes[i] = CipherSuite.getClientKeyType(keyTypeBytes[i]); [all...] |
SSLServerSocketImpl.java | 101 return CipherSuite.getSupportedCipherSuiteNames();
|
/external/chromium_org/jingle/glue/ |
fake_ssl_client_socket.cc | 30 0x00, 0x2d, // ciphersuite len
|
/external/chromium_org/net/http/ |
http_response_info.cc | 77 // This contains the ciphersuite used to fetch the resource as well as the
|
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
SSLEngineTest.java | [all...] |
/external/chromium/net/socket/ |
ssl_client_socket_nss.cc | 537 << " for cipherSuite " << cipher_suite; [all...] |
ssl_client_socket_unittest.cc | 563 // Rather than exhaustively disabling every RC4 ciphersuite defined at
|
/external/chromium_org/net/third_party/nss/ssl/ |
ssl3ext.c | [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssl_ciph.c | 327 /* FIPS 140-2 approved ciphersuite */ [all...] |
/external/openssl/ssl/ |
ssl_ciph.c | 327 /* FIPS 140-2 approved ciphersuite */ [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
socketadapters.cc | 144 0x00, 0x2d, // ciphersuite len
|