Home
last modified time | relevance | path

Searched refs:ciphers (Results 1 – 25 of 73) sorted by relevance

123

/external/curl/lib/vtls/
Dgskit.c305 } ciphers[CURL_GSKPROTO_LAST]; in set_ciphers() local
320 memset((char *) ciphers, 0, sizeof ciphers); in set_ciphers()
322 ciphers[i].buf = malloc(l); in set_ciphers()
323 if(!ciphers[i].buf) { in set_ciphers()
325 free(ciphers[i].buf); in set_ciphers()
328 ciphers[i].ptr = ciphers[i].buf; in set_ciphers()
329 *ciphers[i].ptr = '\0'; in set_ciphers()
354 strcpy(ciphers[i].ptr, ctp->gsktoken); in set_ciphers()
355 ciphers[i].ptr += strlen(ctp->gsktoken); in set_ciphers()
367 if(!(*protoflags & (1 << i)) || !ciphers[i].buf[0]) { in set_ciphers()
[all …]
/external/boringssl/src/tool/
Dciphers.cc42 STACK_OF(SSL_CIPHER) *ciphers = pref_list->ciphers; in Ciphers()
45 for (size_t i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in Ciphers()
47 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in Ciphers()
DCMakeLists.txt7 ciphers.cc
/external/wpa_supplicant_8/src/common/
Dwpa_common.c1771 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument
1775 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites()
1779 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites()
1783 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites()
1787 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites()
1791 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites()
1795 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites()
1804 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument
1808 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites()
1812 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites()
[all …]
Dwpa_common.h456 int rsn_cipher_put_suites(u8 *pos, int ciphers);
457 int wpa_cipher_put_suites(u8 *pos, int ciphers);
458 int wpa_pick_pairwise_cipher(int ciphers, int none_allowed);
459 int wpa_pick_group_cipher(int ciphers);
461 int wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim);
/external/webrtc/webrtc/p2p/base/
Dtransportchannel.cc57 bool TransportChannel::SetSrtpCryptoSuites(const std::vector<int>& ciphers) { in SetSrtpCryptoSuites() argument
62 bool TransportChannel::SetSrtpCiphers(const std::vector<std::string>& ciphers) { in SetSrtpCiphers() argument
64 for (const auto cipher : ciphers) { in SetSrtpCiphers()
Ddtlstransportchannel.cc295 const std::vector<int>& ciphers) { in SetSrtpCryptoSuites() argument
296 if (srtp_ciphers_ == ciphers) in SetSrtpCryptoSuites()
314 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher); in SetSrtpCryptoSuites()
315 if (iter == ciphers.end()) { in SetSrtpCryptoSuites()
317 for (size_t i = 0; i < ciphers.size(); ++i) { in SetSrtpCryptoSuites()
319 requested_str.append(rtc::SrtpCryptoSuiteToName(ciphers[i])); in SetSrtpCryptoSuites()
334 srtp_ciphers_ = ciphers; in SetSrtpCryptoSuites()
Dtransportchannel.h113 virtual bool SetSrtpCryptoSuites(const std::vector<int>& ciphers);
117 virtual bool SetSrtpCiphers(const std::vector<std::string>& ciphers);
Dfaketransportcontroller.h245 bool SetSrtpCryptoSuites(const std::vector<int>& ciphers) override { in SetSrtpCryptoSuites() argument
246 srtp_ciphers_ = ciphers; in SetSrtpCryptoSuites()
/external/curl/docs/
DSSL-PROBLEMS43 Clients give servers a list of ciphers to select from. If the list doesn't
44 include any ciphers the server wants/can use, the connection handshake
48 ciphers from its default set (slightly depending on SSL backend in use).
50 You may have to explicitly provide an alternative list of ciphers for curl
53 Note that these weak ciphers are identified as flawed. For example, this
54 includes symmetric ciphers with less than 128 bit keys and RC4.
/external/libnl/python/examples/
Dwiphy.py83 ciphers = nl.nla_data(attr[nl80211.NL80211_ATTR_CIPHER_SUITES])
84 num = len(ciphers) / 4
88 print("\t\t* %s" % cipher_name(ciphers[i:i+4]))
/external/openssh/
Dcipher.c80 static const struct sshcipher ciphers[] = { variable
136 for (c = ciphers; c->name != NULL; c++) { in cipher_alg_list()
220 for (c = ciphers; c->name != NULL; c++) in cipher_by_name()
230 for (c = ciphers; c->name != NULL; c++) in cipher_by_number()
271 for (c = ciphers; c->name != NULL; c++) in cipher_number()
Dreadconf.h73 char *ciphers; /* SSH2 ciphers in order of preference. */ member
Dservconf.h93 char *ciphers; /* Supported SSH2 ciphers. */ member
/external/wpa_supplicant_8/src/ap/
Dwpa_auth_ie.c504 int ciphers, key_mgmt, res, version; in wpa_validate_wpa_ie() local
666 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; in wpa_validate_wpa_ie()
668 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; in wpa_validate_wpa_ie()
669 if (!ciphers) { in wpa_validate_wpa_ie()
685 if (ciphers & WPA_CIPHER_TKIP) { in wpa_validate_wpa_ie()
726 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie()
/external/conscrypt/openjdk-benchmarks/src/jmh/java/org/conscrypt/benchmarks/
DSslEngineBenchmark.java194 ctx.ciphers(Collections.singletonList(cipher)); in newClientContext()
211 ctx.ciphers(Collections.singletonList(cipher)); in newServerContext()
/external/wpa_supplicant_8/src/eap_peer/
Deap_fast.c1446 u8 ciphers[7]; in eap_fast_set_provisioning_ciphers() local
1452 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA; in eap_fast_set_provisioning_ciphers()
1458 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES256_SHA; in eap_fast_set_provisioning_ciphers()
1459 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA; in eap_fast_set_provisioning_ciphers()
1460 ciphers[count++] = TLS_CIPHER_AES256_SHA; in eap_fast_set_provisioning_ciphers()
1461 ciphers[count++] = TLS_CIPHER_AES128_SHA; in eap_fast_set_provisioning_ciphers()
1462 ciphers[count++] = TLS_CIPHER_RC4_SHA; in eap_fast_set_provisioning_ciphers()
1465 ciphers[count++] = TLS_CIPHER_NONE; in eap_fast_set_provisioning_ciphers()
1468 ciphers)) { in eap_fast_set_provisioning_ciphers()
/external/wpa_supplicant_8/src/tls/
Dtlsv1_server.h37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
Dtlsv1_client.h41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
Dtlsv1_server.c659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) in tlsv1_server_set_cipher_list() argument
665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) { in tlsv1_server_set_cipher_list()
/external/libvncserver/webclients/java-applet/ssl/
Dss_vncviewer212 ciphers=""
276 "-anondh") ciphers="ciphers=$anondh"
281 "-ciphers") shift; ciphers="ciphers=$1"
3153 if [ "X$ciphers" != "X" ]; then
3154 cipher_args=`echo "$ciphers" | sed -e 's/ciphers=/-cipher /'`
3455 $ciphers
3507 $ciphers
/external/wpa_supplicant_8/src/crypto/
Dtls_internal.c648 u8 *ciphers) in tls_connection_set_cipher_list() argument
652 return tlsv1_client_set_cipher_list(conn->client, ciphers); in tls_connection_set_cipher_list()
656 return tlsv1_server_set_cipher_list(conn->server, ciphers); in tls_connection_set_cipher_list()
Dtls_none.c144 u8 *ciphers) in tls_connection_set_cipher_list() argument
/external/webrtc/webrtc/base/
Dopensslstreamadapter.cc414 const std::vector<int>& ciphers) { in SetDtlsSrtpCryptoSuites() argument
421 for (std::vector<int>::const_iterator cipher = ciphers.begin(); in SetDtlsSrtpCryptoSuites()
422 cipher != ciphers.end(); ++cipher) { in SetDtlsSrtpCryptoSuites()
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml51 # home network; allow all valid ciphers
59 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers

123