/external/chromium_org/net/ssl/ |
ssl_cipher_suite_names_unittest.cc | 38 uint16 cipher_suite = 0; local 39 EXPECT_TRUE(ParseSSLCipherString("0x0004", &cipher_suite)); 40 EXPECT_EQ(0x00004u, cipher_suite); 42 EXPECT_TRUE(ParseSSLCipherString("0xBEEF", &cipher_suite)); 43 EXPECT_EQ(0xBEEFu, cipher_suite); 54 uint16 cipher_suite = 0; local 55 EXPECT_FALSE(ParseSSLCipherString(cipher_strings[i], &cipher_suite));
|
ssl_cipher_suite_names.cc | 29 uint16 cipher_suite, encoded; member in struct:CipherSuite 266 if (a->cipher_suite < b->cipher_suite) { 268 } else if (a->cipher_suite == b->cipher_suite) { 279 uint16 cipher_suite) { 284 desired.cipher_suite = cipher_suite; 337 uint16* cipher_suite) { 342 *cipher_suite = static_cast<uint16>(value) [all...] |
/external/chromium_org/third_party/libjingle/source/talk/media/base/ |
cryptoparams.h | 40 : tag(t), cipher_suite(cs), key_params(kp), session_params(sp) {} 43 return (tag == params.tag && cipher_suite == params.cipher_suite); 47 std::string cipher_suite; member in struct:cricket::CryptoParams
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
ClientHelloTest.java | 40 CipherSuite[] cipher_suite = new CipherSuite[] { local 43 ses_id, cipher_suite);
|
ServerHelloTest.java | 33 CipherSuite cipher_suite = CipherSuite.TLS_DH_DSS_WITH_DES_CBC_SHA; local 36 server_version, session_id, cipher_suite, (byte) 0); 44 assertEquals("incorrect CertificateRequest", cipher_suite, 45 message.cipher_suite); 63 assertEquals("incorrect message decoding", message.cipher_suite, 64 message_2.cipher_suite);
|
ServerHandshakeImplTest.java | 68 CipherSuite[] cipher_suite = new CipherSuite[] { local 71 ses_id, cipher_suite);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_read.c | 35 u16 cipher_suite; local 120 /* CipherSuite cipher_suite */ 123 cipher_suite = WPA_GET_BE16(pos); 126 if (cipher_suite == conn->cipher_suites[i]) 131 "cipher suite 0x%04x", cipher_suite); 137 if (conn->session_resumed && cipher_suite != conn->prev_cipher_suite) { 140 "0x%04x)", cipher_suite, conn->prev_cipher_suite); 146 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { 154 conn->prev_cipher_suite = cipher_suite; 625 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { [all...] |
tlsv1_record.h | 51 u16 cipher_suite; member in struct:tlsv1_record_layer 61 u16 cipher_suite);
|
tlsv1_server_i.h | 41 u16 cipher_suite; member in struct:tlsv1_server
|
tlsv1_server_read.c | 54 u16 cipher_suite; local 157 cipher_suite = 0; 158 for (i = 0; !cipher_suite && i < conn->num_cipher_suites; i++) { 165 if (!cipher_suite && tmp == conn->cipher_suites[i]) { 166 cipher_suite = tmp; 172 if (!cipher_suite) { 179 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { 187 conn->cipher_suite = cipher_suite; 748 suite = tls_get_cipher_suite(conn->rl.cipher_suite); [all...] |
/external/chromium_org/chrome/browser/net/ |
ssl_config_service_manager_pref.cc | 53 uint16 cipher_suite = 0; local 54 if (!net::ParseSSLCipherString(*it, &cipher_suite)) { 59 cipher_suites.push_back(cipher_suite);
|
/external/chromium_org/chrome/browser/ui/website_settings/ |
website_settings.cc | 549 uint16 cipher_suite = local 551 if (ssl.security_bits > 0 && cipher_suite) { 567 &key_exchange, &cipher, &mac, &is_aead, cipher_suite);
|
/external/chromium_org/net/quic/ |
quic_client_session.cc | 413 int cipher_suite; local 417 cipher_suite = 0xc02f; // TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 421 cipher_suite = 0xcc13; // TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 430 (cipher_suite & SSL_CONNECTION_CIPHERSUITE_MASK) <<
|
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_cp.c | 48 u8 *cipher_suite; member in struct:ieee802_1x_cp_sm 100 os_memcmp(sm->current_cipher_suite, sm->cipher_suite, 200 os_memcpy(sm->current_cipher_suite, sm->cipher_suite, CS_ID_LEN); 463 sm->cipher_suite = os_zalloc(CS_ID_LEN); 465 if (!sm->cipher_suite || !sm->current_cipher_suite) { 467 os_free(sm->cipher_suite); 473 os_memcpy(sm->cipher_suite, default_cs_id, CS_ID_LEN); 533 os_free(sm->cipher_suite); 624 os_memcpy(sm->cipher_suite, pid, CS_ID_LEN);
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
s3_clnt.c | 799 uint16_t server_version, cipher_suite; local 819 !CBS_get_u16(&server_hello, &cipher_suite) || 872 ssl3_get_cipher_by_value(cipher_suite); 909 c = ssl3_get_cipher_by_value(cipher_suite); [all...] |
ssl_lib.c | 1588 uint16_t cipher_suite; local [all...] |
/external/chromium_org/net/socket/ |
ssl_client_socket_nss.cc | 2796 PRUint16 cipher_suite = SSLConnectionStatusToCipherSuite( local [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
ssl3prot.h | 163 ssl3CipherSuite cipher_suite; member in struct:__anon14296
|
sslimpl.h | 290 unsigned int cipher_suite : 16; member in struct:__anon14329 295 ssl3CipherSuite cipher_suite; 751 ssl3CipherSuite cipher_suite; member in struct:ssl3CipherSuiteDefStr 908 ssl3CipherSuite cipher_suite; member in struct:SSL3HandshakeStateStr 1073 ssl3CipherSuite cipher_suite; member in struct:SessionTicketStr [all...] |
/external/chromium_org/net/url_request/ |
url_request_unittest.cc | 257 int cipher_suite = SSLConnectionStatusToCipherSuite( local 259 EXPECT_NE(0, cipher_suite); 7069 int cipher_suite; local [all...] |