HomeSort by relevance Sort by last modified time
    Searched refs:ciphers (Results 26 - 50 of 90) sorted by null

12 3 4

  /external/wpa_supplicant_8/src/crypto/
tls_none.c 144 u8 *ciphers)
tls_internal.c 648 u8 *ciphers)
652 return tlsv1_client_set_cipher_list(conn->client, ciphers);
656 return tlsv1_server_set_cipher_list(conn->server, ciphers);
tls.h 480 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
486 u8 *ciphers);
  /external/conscrypt/openjdk-benchmarks/src/jmh/java/org/conscrypt/benchmarks/
SslEngineBenchmark.java 194 ctx.ciphers(Collections.singletonList(cipher));
211 ctx.ciphers(Collections.singletonList(cipher));
  /prebuilts/go/darwin-x86/src/crypto/cipher/
ctr.go 24 // ctrAble is an interface implemented by ciphers that have a specific optimized
cbc.go 32 // cbcEncAble is an interface implemented by ciphers that have a specific
89 // cbcDecAble is an interface implemented by ciphers that have a specific
  /prebuilts/go/linux-x86/src/crypto/cipher/
ctr.go 24 // ctrAble is an interface implemented by ciphers that have a specific optimized
cbc.go 32 // cbcEncAble is an interface implemented by ciphers that have a specific
89 // cbcDecAble is an interface implemented by ciphers that have a specific
  /external/openssh/
cipher.c 80 static const struct sshcipher ciphers[] = { variable in typeref:struct:sshcipher
128 /* Returns a comma-separated list of supported ciphers. */
136 for (c = ciphers; c->name != NULL; c++) {
220 for (c = ciphers; c->name != NULL; c++)
230 for (c = ciphers; c->name != NULL; c++)
271 for (c = ciphers; c->name != NULL; c++)
servconf.h 93 char *ciphers; /* Supported SSH2 ciphers. */ member in struct:__anon28153
readconf.c 210 { "ciphers", oCiphers },
1092 if (*activep && options->ciphers == NULL)
1093 options->ciphers = xstrdup(arg);
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.h 456 int rsn_cipher_put_suites(u8 *pos, int ciphers);
457 int wpa_cipher_put_suites(u8 *pos, int ciphers);
458 int wpa_pick_pairwise_cipher(int ciphers, int none_allowed);
459 int wpa_pick_group_cipher(int ciphers);
461 int wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim);
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.c 504 int ciphers, key_mgmt, res, version; local
666 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
668 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
669 if (!ciphers) {
685 if (ciphers & WPA_CIPHER_TKIP) {
726 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
  /external/wpa_supplicant_8/src/eap_peer/
eap_fast.c 1446 u8 ciphers[7]; local
    [all...]
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/
_ssl.c 268 char *cacerts_file, char *ciphers)
320 if (ciphers != NULL) {
321 ret = SSL_CTX_set_cipher_list(self->ctx, ciphers);
427 char *ciphers = NULL; local
435 &cacerts_file, &ciphers))
449 ciphers);
454 " cacertsfile, ciphers]) -> sslobject");
    [all...]
  /external/webrtc/webrtc/p2p/base/
faketransportcontroller.h 245 bool SetSrtpCryptoSuites(const std::vector<int>& ciphers) override {
246 srtp_ciphers_ = ciphers;
dtlstransportchannel.h 126 // Set up the ciphers to use for DTLS-SRTP. If this method is not called
127 // before DTLS starts, or |ciphers| is empty, SRTP keys won't be negotiated.
129 bool SetSrtpCryptoSuites(const std::vector<int>& ciphers) override;
227 std::vector<int> srtp_ciphers_; // SRTP ciphers to use with DTLS.
p2ptransportchannel.h 122 // Set up the ciphers to use for DTLS-SRTP.
123 bool SetSrtpCryptoSuites(const std::vector<int>& ciphers) override {
dtlstransportchannel_unittest.cc 149 // SRTP ciphers will be set only in the beginning.
152 std::vector<int> ciphers; local
153 ciphers.push_back(rtc::SRTP_AES128_CM_SHA1_80);
154 ASSERT_TRUE((*it)->SetSrtpCryptoSuites(ciphers));
469 // Check that we negotiated the right ciphers.
649 // Create two channels with DTLS 1.0 and check ciphers.
665 // Create two channels with DTLS 1.2 and check ciphers.
674 // Create two channels with DTLS 1.0 / DTLS 1.2 and check ciphers.
683 // Create two channels with DTLS 1.2 / DTLS 1.0 and check ciphers.
    [all...]
  /external/libvncserver/webclients/java-applet/ssl/
ss_vncviewer 212 ciphers=""
276 "-anondh") ciphers="ciphers=$anondh"
281 "-ciphers") shift; ciphers="ciphers=$1"
    [all...]
  /external/iw/
info.c 297 __u32 *ciphers = nla_data(tb_msg[NL80211_ATTR_CIPHER_SUITES]); local
299 printf("\tSupported Ciphers:\n");
302 cipher_name(ciphers[i]));
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.c 758 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
762 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers)
768 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
  /external/webrtc/webrtc/base/
opensslstreamadapter.cc 414 const std::vector<int>& ciphers) {
421 for (std::vector<int>::const_iterator cipher = ciphers.begin();
422 cipher != ciphers.end(); ++cipher) {
788 // Specify an ECDH group for ECDHE ciphers, otherwise they cannot be
1008 // Select list of available ciphers. Note that !SHA256 and !SHA384 only
    [all...]
sslstreamadapter_unittest.cc 463 void SetDtlsSrtpCryptoSuites(const std::vector<int>& ciphers, bool client) {
465 client_ssl_->SetDtlsSrtpCryptoSuites(ciphers);
467 server_ssl_->SetDtlsSrtpCryptoSuites(ciphers);
907 // Test DTLS-SRTP with all high ciphers
925 // Test DTLS-SRTP with all low ciphers
    [all...]
  /external/curl/lib/vtls/
openssl.c 717 /* Init the global ciphers and digests */
729 /* Free ciphers and digests lists */
1679 char *ciphers; local
    [all...]

Completed in 2115 milliseconds

12 3 4