/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 1439 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument 1443 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites() 1447 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites() 1451 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites() 1455 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites() 1459 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites() 1463 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites() 1472 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument 1476 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites() 1480 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites() [all …]
|
D | wpa_common.h | 441 int rsn_cipher_put_suites(u8 *pos, int ciphers); 442 int wpa_cipher_put_suites(u8 *pos, int ciphers); 443 int wpa_pick_pairwise_cipher(int ciphers, int none_allowed); 444 int wpa_pick_group_cipher(int ciphers); 446 int wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim);
|
/external/boringssl/src/ssl/ |
D | ssl_test.cc | 217 for (size_t i = 0; i < sk_SSL_CIPHER_num(list->ciphers); i++) { in PrintCipherPreferenceList() 218 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(list->ciphers, i); in PrintCipherPreferenceList() 248 for (i = 0; i < sk_SSL_CIPHER_num(ctx->cipher_list->ciphers); i++) { in TestCipherRule() 250 sk_SSL_CIPHER_value(ctx->cipher_list->ciphers, i); in TestCipherRule()
|
D | ssl_lib.c | 454 sk_SSL_CIPHER_free(cipher_list->ciphers); in ssl_cipher_preference_list_free() 462 size_t n = sk_SSL_CIPHER_num(cipher_list->ciphers); in ssl_cipher_preference_list_dup() 469 ret->ciphers = NULL; in ssl_cipher_preference_list_dup() 471 ret->ciphers = sk_SSL_CIPHER_dup(cipher_list->ciphers); in ssl_cipher_preference_list_dup() 472 if (!ret->ciphers) { in ssl_cipher_preference_list_dup() 488 STACK_OF(SSL_CIPHER) *ciphers) { in ssl_cipher_preference_list_from_ciphers() 490 size_t n = sk_SSL_CIPHER_num(ciphers); in ssl_cipher_preference_list_from_ciphers() 496 ret->ciphers = NULL; in ssl_cipher_preference_list_from_ciphers() 498 ret->ciphers = sk_SSL_CIPHER_dup(ciphers); in ssl_cipher_preference_list_from_ciphers() 499 if (!ret->ciphers) { in ssl_cipher_preference_list_from_ciphers() [all …]
|
D | s3_srvr.c | 813 STACK_OF(SSL_CIPHER) *ciphers = NULL; in ssl3_get_client_hello() 1000 ciphers = ssl_bytes_to_cipher_list(s, &cipher_suites); in ssl3_get_client_hello() 1001 if (ciphers == NULL) { in ssl3_get_client_hello() 1011 for (j = 0; j < sk_SSL_CIPHER_num(ciphers); j++) { in ssl3_get_client_hello() 1012 c = sk_SSL_CIPHER_value(ciphers, j); in ssl3_get_client_hello() 1061 if (ciphers == NULL) { in ssl3_get_client_hello() 1081 c = ssl3_choose_cipher(s, ciphers, ssl_get_cipher_preferences(s)); in ssl3_get_client_hello() 1134 sk_SSL_CIPHER_free(ciphers); in ssl3_get_client_hello()
|
/external/openssh/ |
D | cipher.c | 80 static const struct sshcipher ciphers[] = { variable 136 for (c = ciphers; c->name != NULL; c++) { in cipher_alg_list() 220 for (c = ciphers; c->name != NULL; c++) in cipher_by_name() 230 for (c = ciphers; c->name != NULL; c++) in cipher_by_number() 271 for (c = ciphers; c->name != NULL; c++) in cipher_number()
|
D | readconf.h | 73 char *ciphers; /* SSH2 ciphers in order of preference. */ member
|
D | servconf.h | 91 char *ciphers; /* Supported SSH2 ciphers. */ member
|
/external/srtp/crypto/ |
D | Makefile | 69 ciphers = cipher/cipher.o cipher/null_cipher.o \ macro 87 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(xfm)
|
D | Makefile.in | 69 ciphers = cipher/cipher.o cipher/null_cipher.o \ 87 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(xfm)
|
/external/srtp/ |
D | README | 49 crypto/ciphers/ ciphers (null, aes_icm, ...) 67 kernel_driver crypto kernel (ciphers, auth funcs, rng) 72 cipher_driver ciphers
|
D | Makefile | 75 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \ macro 96 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(replay)
|
D | Makefile.in | 77 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \ 98 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(replay)
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ie.c | 462 int ciphers, key_mgmt, res, version; in wpa_validate_wpa_ie() local 600 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; in wpa_validate_wpa_ie() 602 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; in wpa_validate_wpa_ie() 603 if (!ciphers) { in wpa_validate_wpa_ie() 619 if (ciphers & WPA_CIPHER_TKIP) { in wpa_validate_wpa_ie() 656 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_client.h | 41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
|
D | tlsv1_server.h | 37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
|
D | tlsv1_server.c | 659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) in tlsv1_server_set_cipher_list() argument 665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) { in tlsv1_server_set_cipher_list()
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_internal.c | 606 u8 *ciphers) in tls_connection_set_cipher_list() argument 610 return tlsv1_client_set_cipher_list(conn->client, ciphers); in tls_connection_set_cipher_list() 614 return tlsv1_server_set_cipher_list(conn->server, ciphers); in tls_connection_set_cipher_list()
|
D | tls_none.c | 137 u8 *ciphers) in tls_connection_set_cipher_list() argument
|
D | tls.h | 466 u8 *ciphers);
|
D | tls_openssl.c | 740 const char *ciphers; in tls_init() local 834 ciphers = conf->openssl_ciphers; in tls_init() 836 ciphers = "DEFAULT:!EXP:!LOW"; in tls_init() 837 if (SSL_CTX_set_cipher_list(ssl, ciphers) != 1) { in tls_init() 840 ciphers); in tls_init() 3068 u8 *ciphers) in tls_connection_set_cipher_list() argument 3074 if (conn == NULL || conn->ssl == NULL || ciphers == NULL) in tls_connection_set_cipher_list() 3081 c = ciphers; in tls_connection_set_cipher_list()
|
/external/libvncserver/webclients/java-applet/ssl/ |
D | ss_vncviewer | 212 ciphers="" 276 "-anondh") ciphers="ciphers=$anondh" 281 "-ciphers") shift; ciphers="ciphers=$1" 3153 if [ "X$ciphers" != "X" ]; then 3154 cipher_args=`echo "$ciphers" | sed -e 's/ciphers=/-cipher /'` 3455 $ciphers 3507 $ciphers
|
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/ |
D | ss_vncviewer | 212 ciphers="" 276 "-anondh") ciphers="ciphers=$anondh" 281 "-ciphers") shift; ciphers="ciphers=$1" 3120 if [ "X$ciphers" != "X" ]; then 3121 cipher_args=`echo "$ciphers" | sed -e 's/ciphers=/-cipher /'` 3418 $ciphers 3470 $ciphers
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_fast.c | 1446 u8 ciphers[5]; in eap_fast_set_provisioning_ciphers() local 1452 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1458 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1459 ciphers[count++] = TLS_CIPHER_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1460 ciphers[count++] = TLS_CIPHER_RC4_SHA; in eap_fast_set_provisioning_ciphers() 1463 ciphers[count++] = TLS_CIPHER_NONE; in eap_fast_set_provisioning_ciphers() 1466 ciphers)) { in eap_fast_set_provisioning_ciphers()
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 51 # home network; allow all valid ciphers 59 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
|