HomeSort by relevance Sort by last modified time
    Searched refs:cipher_suite (Results 1 - 25 of 43) sorted by null

1 2

  /external/chromium_org/net/ssl/
ssl_cipher_suite_names.h 26 uint16 cipher_suite);
37 // 0xAABB, where AA is cipher_suite[0] and BB is cipher_suite[1], as
42 // result in |cipher_suite|.
47 uint16* cipher_suite);
49 // |cipher_suite| is the IANA id for the cipher suite. What a "secure"
58 NET_EXPORT_PRIVATE bool IsSecureTLSCipherSuite(uint16 cipher_suite);
ssl_cipher_suite_names_unittest.cc 38 uint16 cipher_suite = 0; local
39 EXPECT_TRUE(ParseSSLCipherString("0x0004", &cipher_suite));
40 EXPECT_EQ(0x00004u, cipher_suite);
42 EXPECT_TRUE(ParseSSLCipherString("0xBEEF", &cipher_suite));
43 EXPECT_EQ(0xBEEFu, cipher_suite);
54 uint16 cipher_suite = 0; local
55 EXPECT_FALSE(ParseSSLCipherString(cipher_strings[i], &cipher_suite));
ssl_cipher_suite_names.cc 29 uint16 cipher_suite, encoded; member in struct:CipherSuite
266 if (a->cipher_suite < b->cipher_suite) {
268 } else if (a->cipher_suite == b->cipher_suite) {
279 uint16 cipher_suite) {
284 desired.cipher_suite = cipher_suite;
337 uint16* cipher_suite) {
342 *cipher_suite = static_cast<uint16>(value)
    [all...]
ssl_connection_status_flags.h 66 inline void SSLConnectionStatusSetCipherSuite(int cipher_suite,
72 *connection_status |= ((cipher_suite & SSL_CONNECTION_CIPHERSUITE_MASK)
  /external/chromium_org/third_party/libjingle/source/talk/media/base/
cryptoparams.h 40 : tag(t), cipher_suite(cs), key_params(kp), session_params(sp) {}
43 return (tag == params.tag && cipher_suite == params.cipher_suite);
47 std::string cipher_suite; member in struct:cricket::CryptoParams
  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
ServerHelloTest.java 33 CipherSuite cipher_suite = CipherSuite.TLS_DH_DSS_WITH_DES_CBC_SHA; local
36 server_version, session_id, cipher_suite, (byte) 0);
44 assertEquals("incorrect CertificateRequest", cipher_suite,
45 message.cipher_suite);
63 assertEquals("incorrect message decoding", message.cipher_suite,
64 message_2.cipher_suite);
ClientHelloTest.java 40 CipherSuite[] cipher_suite = new CipherSuite[] { local
43 ses_id, cipher_suite);
ServerHandshakeImplTest.java 68 CipherSuite[] cipher_suite = new CipherSuite[] { local
71 ses_id, cipher_suite);
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.h 51 u16 cipher_suite; member in struct:tlsv1_record_layer
61 u16 cipher_suite);
tlsv1_record.c 22 * @cipher_suite: New cipher suite
31 u16 cipher_suite)
37 cipher_suite);
38 rl->cipher_suite = cipher_suite;
40 suite = tls_get_cipher_suite(cipher_suite);
78 "0x%04x", rl->cipher_suite);
79 rl->write_cipher_suite = rl->cipher_suite;
112 "0x%04x", rl->cipher_suite);
113 rl->read_cipher_suite = rl->cipher_suite;
    [all...]
tlsv1_server_i.h 41 u16 cipher_suite; member in struct:tlsv1_server
tlsv1_client_read.c 35 u16 cipher_suite; local
120 /* CipherSuite cipher_suite */
123 cipher_suite = WPA_GET_BE16(pos);
126 if (cipher_suite == conn->cipher_suites[i])
131 "cipher suite 0x%04x", cipher_suite);
137 if (conn->session_resumed && cipher_suite != conn->prev_cipher_suite) {
140 "0x%04x)", cipher_suite, conn->prev_cipher_suite);
146 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) {
154 conn->prev_cipher_suite = cipher_suite;
625 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) {
    [all...]
tlsv1_server_read.c 54 u16 cipher_suite; local
157 cipher_suite = 0;
158 for (i = 0; !cipher_suite && i < conn->num_cipher_suites; i++) {
165 if (!cipher_suite && tmp == conn->cipher_suites[i]) {
166 cipher_suite = tmp;
172 if (!cipher_suite) {
179 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) {
187 conn->cipher_suite = cipher_suite;
748 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
    [all...]
tlsv1_server_write.c 94 /* CipherSuite cipher_suite */
95 WPA_PUT_BE16(pos, conn->cipher_suite);
163 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
254 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
260 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) {
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_cp.c 48 u8 *cipher_suite; member in struct:ieee802_1x_cp_sm
100 os_memcmp(sm->current_cipher_suite, sm->cipher_suite,
200 os_memcpy(sm->current_cipher_suite, sm->cipher_suite, CS_ID_LEN);
463 sm->cipher_suite = os_zalloc(CS_ID_LEN);
465 if (!sm->cipher_suite || !sm->current_cipher_suite) {
467 os_free(sm->cipher_suite);
473 os_memcpy(sm->cipher_suite, default_cs_id, CS_ID_LEN);
533 os_free(sm->cipher_suite);
624 os_memcpy(sm->cipher_suite, pid, CS_ID_LEN);
  /external/chromium_org/chrome/browser/net/
ssl_config_service_manager_pref.cc 53 uint16 cipher_suite = 0; local
54 if (!net::ParseSSLCipherString(*it, &cipher_suite)) {
59 cipher_suites.push_back(cipher_suite);
  /external/chromium_org/third_party/libjingle/source/talk/session/media/
srtpfilter_unittest.cc 152 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32;
154 answer[0].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32;
237 answer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32;
247 offer[0].cipher_suite = answer[0].cipher_suite = "FOO";
268 answer[0].cipher_suite = "FOO";
347 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32;
358 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32;
360 answer[0].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32;
373 // Change the key parameters and cipher_suite
    [all...]
srtpfilter.cc 167 << " send cipher_suite " << send_cs
168 << " recv cipher_suite " << recv_cs;
204 << " send cipher_suite " << send_cs
205 << " recv cipher_suite " << recv_cs;
401 if (applied_send_params_.cipher_suite == send_params.cipher_suite &&
403 applied_recv_params_.cipher_suite == recv_params.cipher_suite &&
417 ret = (send_session_->SetSend(send_params.cipher_suite,
419 recv_session_->SetRecv(recv_params.cipher_suite,
    [all...]
mediasession.cc 96 out->cipher_suite = cipher;
103 static bool AddCryptoParams(const std::string& cipher_suite,
108 return CreateCryptoParams(size, cipher_suite, &out->at(size));
190 if (CS_AES_CM_128_HMAC_SHA1_80 == i->cipher_suite ||
191 (CS_AES_CM_128_HMAC_SHA1_32 == i->cipher_suite && audio && !bundle)) {
192 return CreateCryptoParams(i->tag, i->cipher_suite, crypto);
573 // Returns true if the |crypto|'s cipher_suite is not found in |filter|.
581 if (it->cipher_suite == crypto.cipher_suite) {
588 // Prunes the |target_cryptos| by removing the crypto params (cipher_suite)
    [all...]
  /external/chromium_org/net/quic/
quic_client_session.cc 413 int cipher_suite; local
417 cipher_suite = 0xc02f; // TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
421 cipher_suite = 0xcc13; // TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
430 (cipher_suite & SSL_CONNECTION_CIPHERSUITE_MASK) <<
  /external/chromium_org/net/third_party/nss/ssl/
ssl3prot.h 163 ssl3CipherSuite cipher_suite; member in struct:__anon14296
sslimpl.h 290 unsigned int cipher_suite : 16; member in struct:__anon14329
295 ssl3CipherSuite cipher_suite;
751 ssl3CipherSuite cipher_suite; member in struct:ssl3CipherSuiteDefStr
908 ssl3CipherSuite cipher_suite; member in struct:SSL3HandshakeStateStr
1073 ssl3CipherSuite cipher_suite; member in struct:SessionTicketStr
    [all...]
  /external/chromium_org/third_party/tlslite/tlslite/
messages.py 262 self.cipher_suite = 0
272 def create(self, version, random, session_id, cipher_suite,
277 self.cipher_suite = cipher_suite
289 self.cipher_suite = p.get(2)
338 w.add(self.cipher_suite, 2)
  /external/chromium_org/chrome/browser/ui/website_settings/
website_settings.cc 549 uint16 cipher_suite = local
551 if (ssl.security_bits > 0 && cipher_suite) {
567 &key_exchange, &cipher, &mac, &is_aead, cipher_suite);
website_settings_unittest.cc 48 int SetSSLCipherSuite(int connection_status, int cipher_suite) {
51 return cipher_suite | connection_status;

Completed in 623 milliseconds

1 2