HomeSort by relevance Sort by last modified time
    Searched refs:cipher_suite (Results 1 - 25 of 35) sorted by null

1 2

  /external/webrtc/talk/media/base/
cryptoparams.h 42 : tag(t), cipher_suite(cs), key_params(kp), session_params(sp) {}
45 return (tag == params.tag && cipher_suite == params.cipher_suite);
49 std::string cipher_suite; member in struct:cricket::CryptoParams
  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
ServerHelloTest.java 33 CipherSuite cipher_suite = CipherSuite.TLS_DH_DSS_WITH_DES_CBC_SHA; local
36 server_version, session_id, cipher_suite, (byte) 0);
44 assertEquals("incorrect CertificateRequest", cipher_suite,
45 message.cipher_suite);
63 assertEquals("incorrect message decoding", message.cipher_suite,
64 message_2.cipher_suite);
ClientHelloTest.java 40 CipherSuite[] cipher_suite = new CipherSuite[] { local
43 ses_id, cipher_suite);
ServerHandshakeImplTest.java 68 CipherSuite[] cipher_suite = new CipherSuite[] { local
71 ses_id, cipher_suite);
  /external/libmicrohttpd/src/testcurl/https/
tls_test_common.h 54 const char *cipher_suite; member in struct:https_test_data
84 const char *cipher_suite, int proto_version,
113 send_curl_req (char *url, struct CBC *cbc, const char *cipher_suite,
117 test_https_transfer (void *cls, const char *cipher_suite, int proto_version);
138 (*test_function) (void * cls, const char *cipher_suite,
140 int daemon_flags, const char *cipher_suite, int proto_version, ...);
test_https_get.c 43 const char *cipher_suite,
62 ret = test_https_transfer (test_fd, cipher_suite, proto_version);
72 const char *cipher_suite,
91 ret = test_https_transfer (test_fd, cipher_suite, proto_version);
test_https_get_parallel_threads.c 65 cargs->cipher_suite, cargs->proto_version);
79 test_single_client (void *cls, const char *cipher_suite,
84 { NULL, cipher_suite, curl_proto_version };
101 test_parallel_clients (void *cls, const char *cipher_suite,
109 { NULL, cipher_suite, curl_proto_version };
test_https_multi_daemon.c 45 const char *cipher_suite,
81 test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0);
83 test_daemon_get (NULL, cipher_suite, proto_version,
88 test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0);
test_https_get_parallel.c 64 cargs->cipher_suite, cargs->proto_version);
79 test_single_client (void *cls, const char *cipher_suite,
84 { NULL, cipher_suite, curl_proto_version };
101 test_parallel_clients (void * cls, const char *cipher_suite,
109 { NULL, cipher_suite, curl_proto_version };
test_tls_authentication.c 47 test_secure_get (void * cls, char *cipher_suite, int proto_version)
65 ret = test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0);
test_tls_options.c 44 test_unmatching_ssl_version (void * cls, const char *cipher_suite,
67 send_curl_req (url, &cbc, cipher_suite, curl_req_ssl_version))
tls_test_common.c 67 const char *cipher_suite, int proto_version,
102 curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, cipher_suite);
204 * @param cipher_suite
210 send_curl_req (char *url, struct CBC * cbc, const char *cipher_suite,
232 curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, cipher_suite);
316 test_https_transfer (void *cls, const char *cipher_suite, int proto_version)
338 if (CURLE_OK != send_curl_req (url, &cbc, cipher_suite, proto_version))
452 (*test_function) (void * cls, const char *cipher_suite,
454 int daemon_flags, const char *cipher_suite, int proto_version, ...)
470 ret = test_function (NULL, cipher_suite, proto_version)
    [all...]
  /external/webrtc/webrtc/base/
sslstreamadapter.cc 57 bool SSLStreamAdapter::GetSslCipherSuite(int* cipher_suite) {
94 std::string SSLStreamAdapter::SslCipherSuiteToName(int cipher_suite) {
95 return OpenSSLStreamAdapter::SslCipherSuiteToName(cipher_suite);
sslstreamadapter.h 162 virtual bool GetSslCipherSuite(int* cipher_suite);
201 static std::string SslCipherSuiteToName(int cipher_suite);
opensslstreamadapter.cc 356 std::string OpenSSLStreamAdapter::SslCipherSuiteToName(int cipher_suite) {
358 const SSL_CIPHER* ssl_cipher = SSL_get_cipher_by_value(cipher_suite);
369 if (cipher_suite == static_cast<int>(entry->openssl_id)) {
377 bool OpenSSLStreamAdapter::GetSslCipherSuite(int* cipher_suite) {
386 *cipher_suite = static_cast<uint16_t>(SSL_CIPHER_get_id(current_cipher));
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.h 51 u16 cipher_suite; member in struct:tlsv1_record_layer
61 u16 cipher_suite);
tlsv1_record.c 22 * @cipher_suite: New cipher suite
31 u16 cipher_suite)
37 cipher_suite);
38 rl->cipher_suite = cipher_suite;
40 suite = tls_get_cipher_suite(cipher_suite);
78 "0x%04x", rl->cipher_suite);
79 rl->write_cipher_suite = rl->cipher_suite;
112 "0x%04x", rl->cipher_suite);
113 rl->read_cipher_suite = rl->cipher_suite;
    [all...]
tlsv1_server_i.h 41 u16 cipher_suite; member in struct:tlsv1_server
tlsv1_server_read.c 126 u16 cipher_suite; local
229 cipher_suite = 0;
230 for (i = 0; !cipher_suite && i < conn->num_cipher_suites; i++) {
237 if (!cipher_suite && tmp == conn->cipher_suites[i]) {
238 cipher_suite = tmp;
244 if (!cipher_suite) {
251 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) {
259 conn->cipher_suite = cipher_suite;
834 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
    [all...]
tlsv1_client_read.c 83 u16 cipher_suite; local
169 /* CipherSuite cipher_suite */
172 cipher_suite = WPA_GET_BE16(pos);
175 if (cipher_suite == conn->cipher_suites[i])
180 "cipher suite 0x%04x", cipher_suite);
186 if (conn->session_resumed && cipher_suite != conn->prev_cipher_suite) {
189 "0x%04x)", cipher_suite, conn->prev_cipher_suite);
195 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) {
203 conn->prev_cipher_suite = cipher_suite;
1080 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) {
    [all...]
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_cp.c 48 u8 *cipher_suite; member in struct:ieee802_1x_cp_sm
100 os_memcmp(sm->current_cipher_suite, sm->cipher_suite,
200 os_memcpy(sm->current_cipher_suite, sm->cipher_suite, CS_ID_LEN);
463 sm->cipher_suite = os_zalloc(CS_ID_LEN);
465 if (!sm->cipher_suite || !sm->current_cipher_suite) {
467 os_free(sm->cipher_suite);
473 os_memcpy(sm->cipher_suite, default_cs_id, CS_ID_LEN);
533 os_free(sm->cipher_suite);
624 os_memcpy(sm->cipher_suite, pid, CS_ID_LEN);
  /external/webrtc/talk/session/media/
srtpfilter_unittest.cc 158 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32;
160 answer[0].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32;
248 answer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32;
258 offer[0].cipher_suite = answer[0].cipher_suite = "FOO";
279 answer[0].cipher_suite = "FOO";
358 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32;
369 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32;
371 answer[0].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32;
384 // Change the key parameters and cipher_suite
    [all...]
srtpfilter.cc 169 << " send cipher_suite " << send_cs
170 << " recv cipher_suite " << recv_cs;
208 << " send cipher_suite " << send_cs
209 << " recv cipher_suite " << recv_cs;
415 if (applied_send_params_.cipher_suite == send_params.cipher_suite &&
417 applied_recv_params_.cipher_suite == recv_params.cipher_suite &&
432 rtc::SrtpCryptoSuiteFromName(send_params.cipher_suite), send_key,
435 rtc::SrtpCryptoSuiteFromName(recv_params.cipher_suite), recv_key
    [all...]
mediasession.cc 108 out->cipher_suite = cipher;
115 static bool AddCryptoParams(const std::string& cipher_suite,
120 return CreateCryptoParams(size, cipher_suite, &out->at(size));
221 if (rtc::CS_AES_CM_128_HMAC_SHA1_80 == i->cipher_suite ||
222 (rtc::CS_AES_CM_128_HMAC_SHA1_32 == i->cipher_suite && audio &&
224 return CreateCryptoParams(i->tag, i->cipher_suite, crypto);
610 // Returns true if the |crypto|'s cipher_suite is not found in |filter|.
618 if (it->cipher_suite == crypto.cipher_suite) {
625 // Prunes the |target_cryptos| by removing the crypto params (cipher_suite)
    [all...]
  /external/jetty/src/java/org/eclipse/jetty/server/
AbstractConnector.java 418 String cipher_suite=httpFields.getStringField(getForwardedCipherSuiteHeader()); local
419 if (cipher_suite!=null)
420 request.setAttribute("javax.servlet.request.cipher_suite",cipher_suite);
    [all...]

Completed in 962 milliseconds

1 2