/external/webrtc/talk/media/base/ |
cryptoparams.h | 42 : tag(t), cipher_suite(cs), key_params(kp), session_params(sp) {} 45 return (tag == params.tag && cipher_suite == params.cipher_suite); 49 std::string cipher_suite; member in struct:cricket::CryptoParams
|
/external/libmicrohttpd/src/testcurl/https/ |
tls_test_common.h | 54 const char *cipher_suite; member in struct:https_test_data 84 const char *cipher_suite, int proto_version, 113 send_curl_req (char *url, struct CBC *cbc, const char *cipher_suite, 117 test_https_transfer (void *cls, const char *cipher_suite, int proto_version); 138 (*test_function) (void * cls, const char *cipher_suite, 140 int daemon_flags, const char *cipher_suite, int proto_version, ...);
|
test_https_get.c | 43 const char *cipher_suite, 62 ret = test_https_transfer (test_fd, cipher_suite, proto_version); 72 const char *cipher_suite, 91 ret = test_https_transfer (test_fd, cipher_suite, proto_version);
|
test_https_get_parallel_threads.c | 65 cargs->cipher_suite, cargs->proto_version); 79 test_single_client (void *cls, const char *cipher_suite, 84 { NULL, cipher_suite, curl_proto_version }; 101 test_parallel_clients (void *cls, const char *cipher_suite, 109 { NULL, cipher_suite, curl_proto_version };
|
test_https_multi_daemon.c | 45 const char *cipher_suite, 81 test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0); 83 test_daemon_get (NULL, cipher_suite, proto_version, 88 test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0);
|
test_https_get_parallel.c | 64 cargs->cipher_suite, cargs->proto_version); 79 test_single_client (void *cls, const char *cipher_suite, 84 { NULL, cipher_suite, curl_proto_version }; 101 test_parallel_clients (void * cls, const char *cipher_suite, 109 { NULL, cipher_suite, curl_proto_version };
|
test_tls_authentication.c | 47 test_secure_get (void * cls, char *cipher_suite, int proto_version) 65 ret = test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0);
|
test_tls_options.c | 44 test_unmatching_ssl_version (void * cls, const char *cipher_suite, 67 send_curl_req (url, &cbc, cipher_suite, curl_req_ssl_version))
|
tls_test_common.c | 67 const char *cipher_suite, int proto_version, 102 curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, cipher_suite); 204 * @param cipher_suite 210 send_curl_req (char *url, struct CBC * cbc, const char *cipher_suite, 232 curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, cipher_suite); 316 test_https_transfer (void *cls, const char *cipher_suite, int proto_version) 338 if (CURLE_OK != send_curl_req (url, &cbc, cipher_suite, proto_version)) 452 (*test_function) (void * cls, const char *cipher_suite, 454 int daemon_flags, const char *cipher_suite, int proto_version, ...) 470 ret = test_function (NULL, cipher_suite, proto_version) [all...] |
/external/webrtc/webrtc/base/ |
sslstreamadapter.cc | 57 bool SSLStreamAdapter::GetSslCipherSuite(int* cipher_suite) { 94 std::string SSLStreamAdapter::SslCipherSuiteToName(int cipher_suite) { 95 return OpenSSLStreamAdapter::SslCipherSuiteToName(cipher_suite);
|
sslstreamadapter.h | 162 virtual bool GetSslCipherSuite(int* cipher_suite); 201 static std::string SslCipherSuiteToName(int cipher_suite);
|
opensslstreamadapter.cc | 356 std::string OpenSSLStreamAdapter::SslCipherSuiteToName(int cipher_suite) { 358 const SSL_CIPHER* ssl_cipher = SSL_get_cipher_by_value(cipher_suite); 369 if (cipher_suite == static_cast<int>(entry->openssl_id)) { 377 bool OpenSSLStreamAdapter::GetSslCipherSuite(int* cipher_suite) { 386 *cipher_suite = static_cast<uint16_t>(SSL_CIPHER_get_id(current_cipher)); [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.h | 51 u16 cipher_suite; member in struct:tlsv1_record_layer 61 u16 cipher_suite);
|
tlsv1_record.c | 22 * @cipher_suite: New cipher suite 31 u16 cipher_suite) 37 cipher_suite); 38 rl->cipher_suite = cipher_suite; 40 suite = tls_get_cipher_suite(cipher_suite); 78 "0x%04x", rl->cipher_suite); 79 rl->write_cipher_suite = rl->cipher_suite; 112 "0x%04x", rl->cipher_suite); 113 rl->read_cipher_suite = rl->cipher_suite; [all...] |
tlsv1_server_i.h | 41 u16 cipher_suite; member in struct:tlsv1_server
|
tlsv1_server_read.c | 126 u16 cipher_suite; local 229 cipher_suite = 0; 230 for (i = 0; !cipher_suite && i < conn->num_cipher_suites; i++) { 237 if (!cipher_suite && tmp == conn->cipher_suites[i]) { 238 cipher_suite = tmp; 244 if (!cipher_suite) { 251 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { 259 conn->cipher_suite = cipher_suite; 834 suite = tls_get_cipher_suite(conn->rl.cipher_suite); [all...] |
tlsv1_client_read.c | 83 u16 cipher_suite; local 169 /* CipherSuite cipher_suite */ 172 cipher_suite = WPA_GET_BE16(pos); 175 if (cipher_suite == conn->cipher_suites[i]) 180 "cipher suite 0x%04x", cipher_suite); 186 if (conn->session_resumed && cipher_suite != conn->prev_cipher_suite) { 189 "0x%04x)", cipher_suite, conn->prev_cipher_suite); 195 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { 203 conn->prev_cipher_suite = cipher_suite; 1077 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { [all...] |
tlsv1_server_write.c | 94 /* CipherSuite cipher_suite */ 95 WPA_PUT_BE16(pos, conn->cipher_suite); 194 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 377 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 383 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) {
|
/external/webrtc/talk/session/media/ |
srtpfilter_unittest.cc | 158 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; 160 answer[0].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; 248 answer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; 258 offer[0].cipher_suite = answer[0].cipher_suite = "FOO"; 279 answer[0].cipher_suite = "FOO"; 358 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; 369 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; 371 answer[0].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; 384 // Change the key parameters and cipher_suite [all...] |
srtpfilter.cc | 169 << " send cipher_suite " << send_cs 170 << " recv cipher_suite " << recv_cs; 208 << " send cipher_suite " << send_cs 209 << " recv cipher_suite " << recv_cs; 415 if (applied_send_params_.cipher_suite == send_params.cipher_suite && 417 applied_recv_params_.cipher_suite == recv_params.cipher_suite && 432 rtc::SrtpCryptoSuiteFromName(send_params.cipher_suite), send_key, 435 rtc::SrtpCryptoSuiteFromName(recv_params.cipher_suite), recv_key [all...] |
mediasession.cc | 108 out->cipher_suite = cipher; 115 static bool AddCryptoParams(const std::string& cipher_suite, 120 return CreateCryptoParams(size, cipher_suite, &out->at(size)); 221 if (rtc::CS_AES_CM_128_HMAC_SHA1_80 == i->cipher_suite || 222 (rtc::CS_AES_CM_128_HMAC_SHA1_32 == i->cipher_suite && audio && 224 return CreateCryptoParams(i->tag, i->cipher_suite, crypto); 610 // Returns true if the |crypto|'s cipher_suite is not found in |filter|. 618 if (it->cipher_suite == crypto.cipher_suite) { 625 // Prunes the |target_cryptos| by removing the crypto params (cipher_suite) [all...] |
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_cp.c | 48 u64 cipher_suite; member in struct:ieee802_1x_cp_sm 100 sm->current_cipher_suite != sm->cipher_suite; 198 sm->current_cipher_suite = sm->cipher_suite; 460 sm->cipher_suite = default_cs_id; 610 sm->cipher_suite = cs;
|
/external/boringssl/src/ssl/ |
tls13_client.cc | 74 uint16_t server_version, cipher_suite; local 80 !CBS_get_u16(&body, &cipher_suite) || 96 const SSL_CIPHER *cipher = SSL_get_cipher_by_value(cipher_suite); 224 uint16_t cipher_suite; local 230 !CBS_get_u16(&body, &cipher_suite) || 257 const SSL_CIPHER *cipher = SSL_get_cipher_by_value(cipher_suite);
|
tls13_server.cc | 120 uint16_t cipher_suite; local 121 if (!CBS_get_u16(&cipher_suites, &cipher_suite)) { 126 const SSL_CIPHER *candidate = SSL_get_cipher_by_value(cipher_suite); [all...] |
/external/syslinux/gpxe/src/net/ |
tls.c | 473 * @v cipher_suite Cipher suite specification 477 unsigned int cipher_suite ) { 484 switch ( cipher_suite ) { 497 tls, ntohs ( cipher_suite ) ); 807 uint16_t cipher_suite; member in struct:__anon38451 834 if ( ( rc = tls_select_cipher ( tls, hello_b->cipher_suite ) ) != 0 ) [all...] |