/external/libmicrohttpd/src/testcurl/https/ |
D | tls_test_common.h | 54 const char *cipher_suite; member 84 const char *cipher_suite, int proto_version, 113 send_curl_req (char *url, struct CBC *cbc, const char *cipher_suite, 117 test_https_transfer (void *cls, const char *cipher_suite, int proto_version); 138 (*test_function) (void * cls, const char *cipher_suite, 140 int daemon_flags, const char *cipher_suite, int proto_version, ...);
|
D | test_https_get_parallel_threads.c | 65 cargs->cipher_suite, cargs->proto_version); in https_transfer_thread_adapter() 79 test_single_client (void *cls, const char *cipher_suite, in test_single_client() argument 84 { NULL, cipher_suite, curl_proto_version }; in test_single_client() 101 test_parallel_clients (void *cls, const char *cipher_suite, in test_parallel_clients() argument 109 { NULL, cipher_suite, curl_proto_version }; in test_parallel_clients()
|
D | test_https_get_parallel.c | 64 cargs->cipher_suite, cargs->proto_version); in https_transfer_thread_adapter() 79 test_single_client (void *cls, const char *cipher_suite, in test_single_client() argument 84 { NULL, cipher_suite, curl_proto_version }; in test_single_client() 101 test_parallel_clients (void * cls, const char *cipher_suite, in test_parallel_clients() argument 109 { NULL, cipher_suite, curl_proto_version }; in test_parallel_clients()
|
D | test_https_get.c | 43 const char *cipher_suite, in test_cipher_option() argument 62 ret = test_https_transfer (test_fd, cipher_suite, proto_version); in test_cipher_option() 72 const char *cipher_suite, in test_secure_get() argument 91 ret = test_https_transfer (test_fd, cipher_suite, proto_version); in test_secure_get()
|
D | test_https_multi_daemon.c | 45 const char *cipher_suite, in test_concurent_daemon_pair() argument 81 test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0); in test_concurent_daemon_pair() 83 test_daemon_get (NULL, cipher_suite, proto_version, in test_concurent_daemon_pair() 88 test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0); in test_concurent_daemon_pair()
|
D | tls_test_common.c | 67 const char *cipher_suite, int proto_version, in test_daemon_get() argument 102 curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, cipher_suite); in test_daemon_get() 210 send_curl_req (char *url, struct CBC * cbc, const char *cipher_suite, in send_curl_req() argument 232 curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, cipher_suite); in send_curl_req() 316 test_https_transfer (void *cls, const char *cipher_suite, int proto_version) in test_https_transfer() argument 338 if (CURLE_OK != send_curl_req (url, &cbc, cipher_suite, proto_version)) in test_https_transfer() 452 (*test_function) (void * cls, const char *cipher_suite, in test_wrap() argument 454 int daemon_flags, const char *cipher_suite, int proto_version, ...) in test_wrap() 470 ret = test_function (NULL, cipher_suite, proto_version); in test_wrap()
|
D | test_tls_authentication.c | 47 test_secure_get (void * cls, char *cipher_suite, int proto_version) in test_secure_get() argument 65 ret = test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0); in test_secure_get()
|
D | test_tls_options.c | 44 test_unmatching_ssl_version (void * cls, const char *cipher_suite, in test_unmatching_ssl_version() argument 67 send_curl_req (url, &cbc, cipher_suite, curl_req_ssl_version)) in test_unmatching_ssl_version()
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
D | ServerHelloTest.java | 33 CipherSuite cipher_suite = CipherSuite.TLS_DH_DSS_WITH_DES_CBC_SHA; in testServerHello() local 36 server_version, session_id, cipher_suite, (byte) 0); in testServerHello() 44 assertEquals("incorrect CertificateRequest", cipher_suite, in testServerHello() 45 message.cipher_suite); in testServerHello() 63 assertEquals("incorrect message decoding", message.cipher_suite, in testServerHello() 64 message_2.cipher_suite); in testServerHello()
|
D | ClientHelloTest.java | 40 CipherSuite[] cipher_suite = new CipherSuite[] { in testClientHello() local 43 ses_id, cipher_suite); in testClientHello()
|
D | ServerHandshakeImplTest.java | 68 CipherSuite[] cipher_suite = new CipherSuite[] { in testUnwrap() local 71 ses_id, cipher_suite); in testUnwrap()
|
/external/webrtc/talk/media/base/ |
D | cryptoparams.h | 42 : tag(t), cipher_suite(cs), key_params(kp), session_params(sp) {} in CryptoParams() 45 return (tag == params.tag && cipher_suite == params.cipher_suite); in Matches() 49 std::string cipher_suite; member
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_record.c | 31 u16 cipher_suite) in tlsv1_record_set_cipher_suite() argument 37 cipher_suite); in tlsv1_record_set_cipher_suite() 38 rl->cipher_suite = cipher_suite; in tlsv1_record_set_cipher_suite() 40 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite() 78 "0x%04x", rl->cipher_suite); in tlsv1_record_change_write_cipher() 79 rl->write_cipher_suite = rl->cipher_suite; in tlsv1_record_change_write_cipher() 112 "0x%04x", rl->cipher_suite); in tlsv1_record_change_read_cipher() 113 rl->read_cipher_suite = rl->cipher_suite; in tlsv1_record_change_read_cipher()
|
D | tlsv1_record.h | 51 u16 cipher_suite; member 61 u16 cipher_suite);
|
D | tlsv1_server_read.c | 126 u16 cipher_suite; in tls_process_client_hello() local 229 cipher_suite = 0; in tls_process_client_hello() 230 for (i = 0; !cipher_suite && i < conn->num_cipher_suites; i++) { in tls_process_client_hello() 237 if (!cipher_suite && tmp == conn->cipher_suites[i]) { in tls_process_client_hello() 238 cipher_suite = tmp; in tls_process_client_hello() 244 if (!cipher_suite) { in tls_process_client_hello() 251 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { in tls_process_client_hello() 259 conn->cipher_suite = cipher_suite; in tls_process_client_hello() 834 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange()
|
D | tlsv1_client_read.c | 83 u16 cipher_suite; in tls_process_server_hello() local 172 cipher_suite = WPA_GET_BE16(pos); in tls_process_server_hello() 175 if (cipher_suite == conn->cipher_suites[i]) in tls_process_server_hello() 180 "cipher suite 0x%04x", cipher_suite); in tls_process_server_hello() 186 if (conn->session_resumed && cipher_suite != conn->prev_cipher_suite) { in tls_process_server_hello() 189 "0x%04x)", cipher_suite, conn->prev_cipher_suite); in tls_process_server_hello() 195 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { in tls_process_server_hello() 203 conn->prev_cipher_suite = cipher_suite; in tls_process_server_hello() 1080 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { in tls_process_server_key_exchange() 1089 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange()
|
D | tlsv1_server_i.h | 41 u16 cipher_suite; member
|
/external/webrtc/webrtc/base/ |
D | sslstreamadapter.cc | 57 bool SSLStreamAdapter::GetSslCipherSuite(int* cipher_suite) { in GetSslCipherSuite() argument 94 std::string SSLStreamAdapter::SslCipherSuiteToName(int cipher_suite) { in SslCipherSuiteToName() argument 95 return OpenSSLStreamAdapter::SslCipherSuiteToName(cipher_suite); in SslCipherSuiteToName()
|
D | sslstreamadapter.h | 162 virtual bool GetSslCipherSuite(int* cipher_suite); 201 static std::string SslCipherSuiteToName(int cipher_suite);
|
D | opensslstreamadapter.cc | 356 std::string OpenSSLStreamAdapter::SslCipherSuiteToName(int cipher_suite) { in SslCipherSuiteToName() argument 358 const SSL_CIPHER* ssl_cipher = SSL_get_cipher_by_value(cipher_suite); in SslCipherSuiteToName() 369 if (cipher_suite == static_cast<int>(entry->openssl_id)) { in SslCipherSuiteToName() 377 bool OpenSSLStreamAdapter::GetSslCipherSuite(int* cipher_suite) { in GetSslCipherSuite() argument 386 *cipher_suite = static_cast<uint16_t>(SSL_CIPHER_get_id(current_cipher)); in GetSslCipherSuite()
|
/external/wpa_supplicant_8/src/pae/ |
D | ieee802_1x_cp.c | 48 u8 *cipher_suite; member 100 os_memcmp(sm->current_cipher_suite, sm->cipher_suite, in changed_cipher() 200 os_memcpy(sm->current_cipher_suite, sm->cipher_suite, CS_ID_LEN); in SM_STATE() 463 sm->cipher_suite = os_zalloc(CS_ID_LEN); in ieee802_1x_cp_sm_init() 465 if (!sm->cipher_suite || !sm->current_cipher_suite) { in ieee802_1x_cp_sm_init() 467 os_free(sm->cipher_suite); in ieee802_1x_cp_sm_init() 473 os_memcpy(sm->cipher_suite, default_cs_id, CS_ID_LEN); in ieee802_1x_cp_sm_init() 533 os_free(sm->cipher_suite); in ieee802_1x_cp_sm_deinit() 624 os_memcpy(sm->cipher_suite, pid, CS_ID_LEN); in ieee802_1x_cp_set_ciphersuite()
|
/external/webrtc/talk/session/media/ |
D | srtpfilter.cc | 415 if (applied_send_params_.cipher_suite == send_params.cipher_suite && in ApplyParams() 417 applied_recv_params_.cipher_suite == recv_params.cipher_suite && in ApplyParams() 432 rtc::SrtpCryptoSuiteFromName(send_params.cipher_suite), send_key, in ApplyParams() 435 rtc::SrtpCryptoSuiteFromName(recv_params.cipher_suite), recv_key, in ApplyParams() 440 << " send cipher_suite " << send_params.cipher_suite in ApplyParams() 441 << " recv cipher_suite " << recv_params.cipher_suite; in ApplyParams()
|
D | srtpfilter_unittest.cc | 158 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F() 160 answer[0].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F() 248 answer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F() 258 offer[0].cipher_suite = answer[0].cipher_suite = "FOO"; in TEST_F() 279 answer[0].cipher_suite = "FOO"; in TEST_F() 358 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F() 369 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F() 371 answer[0].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F() 386 offer[0].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F() 388 answer[0].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F() [all …]
|
D | mediasession.cc | 108 out->cipher_suite = cipher; in CreateCryptoParams() 115 static bool AddCryptoParams(const std::string& cipher_suite, in AddCryptoParams() argument 120 return CreateCryptoParams(size, cipher_suite, &out->at(size)); in AddCryptoParams() 221 if (rtc::CS_AES_CM_128_HMAC_SHA1_80 == i->cipher_suite || in SelectCrypto() 222 (rtc::CS_AES_CM_128_HMAC_SHA1_32 == i->cipher_suite && audio && in SelectCrypto() 224 return CreateCryptoParams(i->tag, i->cipher_suite, crypto); in SelectCrypto() 618 if (it->cipher_suite == crypto.cipher_suite) { in CryptoNotFound()
|
/external/jetty/src/java/org/eclipse/jetty/server/ |
D | AbstractConnector.java | 418 String cipher_suite=httpFields.getStringField(getForwardedCipherSuiteHeader()); in checkForwardedHeaders() local 419 if (cipher_suite!=null) in checkForwardedHeaders() 420 request.setAttribute("javax.servlet.request.cipher_suite",cipher_suite); in checkForwardedHeaders()
|