/external/curl/lib/vtls/ |
D | gskit.c | 305 } ciphers[CURL_GSKPROTO_LAST]; in set_ciphers() local 320 memset((char *) ciphers, 0, sizeof ciphers); in set_ciphers() 322 ciphers[i].buf = malloc(l); in set_ciphers() 323 if(!ciphers[i].buf) { in set_ciphers() 325 free(ciphers[i].buf); in set_ciphers() 328 ciphers[i].ptr = ciphers[i].buf; in set_ciphers() 329 *ciphers[i].ptr = '\0'; in set_ciphers() 354 strcpy(ciphers[i].ptr, ctp->gsktoken); in set_ciphers() 355 ciphers[i].ptr += strlen(ctp->gsktoken); in set_ciphers() 367 if(!(*protoflags & (1 << i)) || !ciphers[i].buf[0]) { in set_ciphers() [all …]
|
/external/boringssl/src/tool/ |
D | ciphers.cc | 42 STACK_OF(SSL_CIPHER) *ciphers = pref_list->ciphers; in Ciphers() 45 for (size_t i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in Ciphers() 47 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in Ciphers()
|
D | CMakeLists.txt | 7 ciphers.cc
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 1771 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument 1775 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites() 1779 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites() 1783 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites() 1787 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites() 1791 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites() 1795 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites() 1804 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument 1808 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites() 1812 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites() [all …]
|
D | wpa_common.h | 456 int rsn_cipher_put_suites(u8 *pos, int ciphers); 457 int wpa_cipher_put_suites(u8 *pos, int ciphers); 458 int wpa_pick_pairwise_cipher(int ciphers, int none_allowed); 459 int wpa_pick_group_cipher(int ciphers); 461 int wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim);
|
/external/webrtc/webrtc/p2p/base/ |
D | transportchannel.cc | 57 bool TransportChannel::SetSrtpCryptoSuites(const std::vector<int>& ciphers) { in SetSrtpCryptoSuites() argument 62 bool TransportChannel::SetSrtpCiphers(const std::vector<std::string>& ciphers) { in SetSrtpCiphers() argument 64 for (const auto cipher : ciphers) { in SetSrtpCiphers()
|
D | dtlstransportchannel.cc | 295 const std::vector<int>& ciphers) { in SetSrtpCryptoSuites() argument 296 if (srtp_ciphers_ == ciphers) in SetSrtpCryptoSuites() 314 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher); in SetSrtpCryptoSuites() 315 if (iter == ciphers.end()) { in SetSrtpCryptoSuites() 317 for (size_t i = 0; i < ciphers.size(); ++i) { in SetSrtpCryptoSuites() 319 requested_str.append(rtc::SrtpCryptoSuiteToName(ciphers[i])); in SetSrtpCryptoSuites() 334 srtp_ciphers_ = ciphers; in SetSrtpCryptoSuites()
|
D | transportchannel.h | 113 virtual bool SetSrtpCryptoSuites(const std::vector<int>& ciphers); 117 virtual bool SetSrtpCiphers(const std::vector<std::string>& ciphers);
|
D | faketransportcontroller.h | 245 bool SetSrtpCryptoSuites(const std::vector<int>& ciphers) override { in SetSrtpCryptoSuites() argument 246 srtp_ciphers_ = ciphers; in SetSrtpCryptoSuites()
|
/external/curl/docs/ |
D | SSL-PROBLEMS | 43 Clients give servers a list of ciphers to select from. If the list doesn't 44 include any ciphers the server wants/can use, the connection handshake 48 ciphers from its default set (slightly depending on SSL backend in use). 50 You may have to explicitly provide an alternative list of ciphers for curl 53 Note that these weak ciphers are identified as flawed. For example, this 54 includes symmetric ciphers with less than 128 bit keys and RC4.
|
/external/libnl/python/examples/ |
D | wiphy.py | 83 ciphers = nl.nla_data(attr[nl80211.NL80211_ATTR_CIPHER_SUITES]) 84 num = len(ciphers) / 4 88 print("\t\t* %s" % cipher_name(ciphers[i:i+4]))
|
/external/openssh/ |
D | cipher.c | 80 static const struct sshcipher ciphers[] = { variable 136 for (c = ciphers; c->name != NULL; c++) { in cipher_alg_list() 220 for (c = ciphers; c->name != NULL; c++) in cipher_by_name() 230 for (c = ciphers; c->name != NULL; c++) in cipher_by_number() 271 for (c = ciphers; c->name != NULL; c++) in cipher_number()
|
D | readconf.h | 73 char *ciphers; /* SSH2 ciphers in order of preference. */ member
|
D | servconf.h | 93 char *ciphers; /* Supported SSH2 ciphers. */ member
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ie.c | 504 int ciphers, key_mgmt, res, version; in wpa_validate_wpa_ie() local 666 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; in wpa_validate_wpa_ie() 668 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; in wpa_validate_wpa_ie() 669 if (!ciphers) { in wpa_validate_wpa_ie() 685 if (ciphers & WPA_CIPHER_TKIP) { in wpa_validate_wpa_ie() 726 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie()
|
/external/conscrypt/openjdk-benchmarks/src/jmh/java/org/conscrypt/benchmarks/ |
D | SslEngineBenchmark.java | 194 ctx.ciphers(Collections.singletonList(cipher)); in newClientContext() 211 ctx.ciphers(Collections.singletonList(cipher)); in newServerContext()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_fast.c | 1446 u8 ciphers[7]; in eap_fast_set_provisioning_ciphers() local 1452 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1458 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES256_SHA; in eap_fast_set_provisioning_ciphers() 1459 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1460 ciphers[count++] = TLS_CIPHER_AES256_SHA; in eap_fast_set_provisioning_ciphers() 1461 ciphers[count++] = TLS_CIPHER_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1462 ciphers[count++] = TLS_CIPHER_RC4_SHA; in eap_fast_set_provisioning_ciphers() 1465 ciphers[count++] = TLS_CIPHER_NONE; in eap_fast_set_provisioning_ciphers() 1468 ciphers)) { in eap_fast_set_provisioning_ciphers()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_server.h | 37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
|
D | tlsv1_client.h | 41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
|
D | tlsv1_server.c | 659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) in tlsv1_server_set_cipher_list() argument 665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) { in tlsv1_server_set_cipher_list()
|
/external/libvncserver/webclients/java-applet/ssl/ |
D | ss_vncviewer | 212 ciphers="" 276 "-anondh") ciphers="ciphers=$anondh" 281 "-ciphers") shift; ciphers="ciphers=$1" 3153 if [ "X$ciphers" != "X" ]; then 3154 cipher_args=`echo "$ciphers" | sed -e 's/ciphers=/-cipher /'` 3455 $ciphers 3507 $ciphers
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_internal.c | 648 u8 *ciphers) in tls_connection_set_cipher_list() argument 652 return tlsv1_client_set_cipher_list(conn->client, ciphers); in tls_connection_set_cipher_list() 656 return tlsv1_server_set_cipher_list(conn->server, ciphers); in tls_connection_set_cipher_list()
|
D | tls_none.c | 144 u8 *ciphers) in tls_connection_set_cipher_list() argument
|
/external/webrtc/webrtc/base/ |
D | opensslstreamadapter.cc | 414 const std::vector<int>& ciphers) { in SetDtlsSrtpCryptoSuites() argument 421 for (std::vector<int>::const_iterator cipher = ciphers.begin(); in SetDtlsSrtpCryptoSuites() 422 cipher != ciphers.end(); ++cipher) { in SetDtlsSrtpCryptoSuites()
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 51 # home network; allow all valid ciphers 59 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
|