/external/okhttp/repackaged/okhttp/src/main/java/com/android/okhttp/ |
D | Handshake.java | 38 private final String cipherSuite; field in Handshake 43 String cipherSuite, List<Certificate> peerCertificates, List<Certificate> localCertificates) { in Handshake() argument 44 this.cipherSuite = cipherSuite; in Handshake() 50 String cipherSuite = session.getCipherSuite(); in get() local 51 if (cipherSuite == null) throw new IllegalStateException("cipherSuite == null"); in get() 68 return new Handshake(cipherSuite, peerCertificatesList, localCertificatesList); in get() 72 String cipherSuite, List<Certificate> peerCertificates, List<Certificate> localCertificates) { in get() argument 73 if (cipherSuite == null) throw new IllegalArgumentException("cipherSuite == null"); in get() 74 return new Handshake(cipherSuite, Util.immutableList(peerCertificates), in get() 79 public String cipherSuite() { in cipherSuite() method in Handshake [all …]
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
D | Handshake.java | 36 private final String cipherSuite; field in Handshake 41 String cipherSuite, List<Certificate> peerCertificates, List<Certificate> localCertificates) { in Handshake() argument 42 this.cipherSuite = cipherSuite; in Handshake() 48 String cipherSuite = session.getCipherSuite(); in get() local 49 if (cipherSuite == null) throw new IllegalStateException("cipherSuite == null"); in get() 66 return new Handshake(cipherSuite, peerCertificatesList, localCertificatesList); in get() 70 String cipherSuite, List<Certificate> peerCertificates, List<Certificate> localCertificates) { in get() argument 71 if (cipherSuite == null) throw new IllegalArgumentException("cipherSuite == null"); in get() 72 return new Handshake(cipherSuite, Util.immutableList(peerCertificates), in get() 77 public String cipherSuite() { in cipherSuite() method in Handshake [all …]
|
/external/conscrypt/repackaged/openjdk/src/test/java/com/android/org/conscrypt/ |
D | MockSessionBuilder.java | 35 private String cipherSuite = DEFAULT_CIPHER_SUITE; field in MockSessionBuilder 58 MockSessionBuilder cipherSuite(String cipherSuite) { in cipherSuite() argument 59 this.cipherSuite = cipherSuite; in cipherSuite() 82 when(session.getCipherSuite()).thenReturn(cipherSuite); in build()
|
/external/conscrypt/openjdk/src/test/java/org/conscrypt/ |
D | MockSessionBuilder.java | 34 private String cipherSuite = DEFAULT_CIPHER_SUITE; field in MockSessionBuilder 57 MockSessionBuilder cipherSuite(String cipherSuite) { in cipherSuite() argument 58 this.cipherSuite = cipherSuite; in cipherSuite() 81 when(session.getCipherSuite()).thenReturn(cipherSuite); in build()
|
/external/conscrypt/repackaged/testing/src/main/java/com/android/org/conscrypt/tlswire/handshake/ |
D | CipherSuite.java | 385 for (CipherSuite cipherSuite : CIPHER_SUITES) { 386 if (byCode.put(cipherSuite.code, cipherSuite) != null) { 388 "Cipher suite multiply defined: " + Integer.toHexString(cipherSuite.code)); 390 String name = cipherSuite.name; 391 if (byName.put(name, cipherSuite) != null) { 393 "Cipher suite multiply defined: " + cipherSuite.name); 395 String androidName = cipherSuite.getAndroidName(); 397 if (byName.put(androidName, cipherSuite) != null) { 399 "Cipher suite multiply defined: " + cipherSuite.androidName);
|
/external/conscrypt/testing/src/main/java/org/conscrypt/tlswire/handshake/ |
D | CipherSuite.java | 381 for (CipherSuite cipherSuite : CIPHER_SUITES) { 382 if (byCode.put(cipherSuite.code, cipherSuite) != null) { 384 "Cipher suite multiply defined: " + Integer.toHexString(cipherSuite.code)); 386 String name = cipherSuite.name; 387 if (byName.put(name, cipherSuite) != null) { 389 "Cipher suite multiply defined: " + cipherSuite.name); 391 String androidName = cipherSuite.getAndroidName(); 393 if (byName.put(androidName, cipherSuite) != null) { 395 "Cipher suite multiply defined: " + cipherSuite.androidName);
|
/external/boringssl/src/ssl/test/runner/ |
D | prf.go | 126 func prfForVersion(version uint16, suite *cipherSuite) func(result, secret, label, seed []byte) { argument 140 func masterFromPreMasterSecret(version uint16, suite *cipherSuite, preMasterSecret, clientRandom, s… argument 152 func extendedMasterFromPreMasterSecret(version uint16, suite *cipherSuite, preMasterSecret []byte, … argument 161 func keysFromMasterSecret(version uint16, suite *cipherSuite, masterSecret, clientRandom, serverRan… argument 183 func newFinishedHash(wireVersion uint16, isDTLS bool, cipherSuite *cipherSuite) finishedHash { argument 192 ret.hash = cipherSuite.hash() 489 func deriveTrafficAEAD(version uint16, suite *cipherSuite, secret []byte, side trafficDirection) in… argument 500 func computePSKBinder(psk []byte, version uint16, label []byte, cipherSuite *cipherSuite, clientHel… argument 501 finishedHash := newFinishedHash(version, false, cipherSuite) 513 func deriveSessionPSK(suite *cipherSuite, version uint16, masterSecret []byte, nonce []byte) []byte… argument
|
D | conn.go | 46 cipherSuite *cipherSuite member 47 earlyCipherSuite *cipherSuite 240 func (hc *halfConn) useTrafficSecret(version uint16, suite *cipherSuite, secret []byte, side traffi… 756 func (c *Conn) useInTrafficSecret(version uint16, suite *cipherSuite, secret []byte) error { 769 func (c *Conn) useOutTrafficSecret(version uint16, suite *cipherSuite, secret []byte) { 1564 …ocessTLS13NewSessionTicket(newSessionTicket *newSessionTicketMsg, cipherSuite *cipherSuite) error { 1585 cipherSuite: cipherSuite.id, 1597 …session.masterSecret = deriveSessionPSK(cipherSuite, c.wireVersion, c.resumptionSecret, newSession… 1631 return c.processTLS13NewSessionTicket(newSessionTicket, c.cipherSuite) 1641 …if err := c.useInTrafficSecret(c.in.wireVersion, c.cipherSuite, updateTrafficSecret(c.cipherSuite.… [all …]
|
D | shim_ticket.go | 240 tag, cipherSuite, _, ok := parseDERElement(session) 241 if !ok || tag != asn1.TagOctetString || len(cipherSuite) != 2 { 245 cipherSuite[0] = byte(id >> 8) 246 cipherSuite[1] = byte(id)
|
D | handshake_server.go | 30 suite *cipherSuite 317 for _, cipherSuite := range hs.clientHello.cipherSuites { 318 if cipherSuite == fallbackSCSV { 439 hs.hello.cipherSuite = hs.suite.id 441 hs.hello.cipherSuite = c.config.Bugs.SendCipherSuite 495 sessionCipher := cipherSuiteFromID(sessionState.cipherSuite) 552 cipherSuite := hs.suite.id 554 cipherSuite = config.Bugs.SendHelloRetryRequestCipherSuite 559 cipherSuite: cipherSuite, 1155 c.cipherSuite = hs.suite [all …]
|
D | ticket.go | 23 cipherSuite uint16 member 38 msg.addU16(s.cipherSuite) 74 s.cipherSuite = uint16(data[2])<<8 | uint16(data[3])
|
D | cipher_suites.go | 76 type cipherSuite struct { struct 90 func (cs cipherSuite) hash() crypto.Hash { argument 97 var cipherSuites = []*cipherSuite{ 413 func mutualCipherSuite(have []uint16, want uint16) *cipherSuite { 422 func cipherSuiteFromID(id uint16) *cipherSuite {
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ |
D | SessionSnapshot.java | 40 private final String cipherSuite; field in SessionSnapshot 53 cipherSuite = session.getCipherSuite(); in SessionSnapshot() 160 return cipherSuite; in getCipherSuite()
|
D | NativeCrypto.java | 789 static String cipherSuiteToJava(String cipherSuite) { in cipherSuiteToJava() argument 791 if ("TLS_RSA_WITH_3DES_EDE_CBC_SHA".equals(cipherSuite)) { in cipherSuiteToJava() 794 return cipherSuite; in cipherSuiteToJava() 829 String cipherSuite = cipherSuiteToJava(allCipherSuites[i]); 830 SUPPORTED_TLS_1_2_CIPHER_SUITES[i / 2] = cipherSuite; 831 SUPPORTED_TLS_1_2_CIPHER_SUITES_SET.add(cipherSuite); 1101 String cipherSuite = cipherSuites[i]; in setEnabledCipherSuites() local 1102 if (cipherSuite.equals(TLS_EMPTY_RENEGOTIATION_INFO_SCSV)) { in setEnabledCipherSuites() 1108 if (cipherSuite.equals(TLS_FALLBACK_SCSV) in setEnabledCipherSuites() 1114 opensslSuites.add(cipherSuiteFromJava(cipherSuite)); in setEnabledCipherSuites()
|
D | NativeSslSession.java | 226 private final String cipherSuite; field in NativeSslSession.Impl 241 this.cipherSuite = in Impl() 278 return cipherSuite; in getCipherSuite()
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
D | SessionSnapshot.java | 39 private final String cipherSuite; field in SessionSnapshot 52 cipherSuite = session.getCipherSuite(); in SessionSnapshot() 159 return cipherSuite; in getCipherSuite()
|
D | NativeCrypto.java | 750 static String cipherSuiteToJava(String cipherSuite) { in cipherSuiteToJava() argument 752 if ("TLS_RSA_WITH_3DES_EDE_CBC_SHA".equals(cipherSuite)) { in cipherSuiteToJava() 755 return cipherSuite; in cipherSuiteToJava() 790 String cipherSuite = cipherSuiteToJava(allCipherSuites[i]); 791 SUPPORTED_TLS_1_2_CIPHER_SUITES[i / 2] = cipherSuite; 792 SUPPORTED_TLS_1_2_CIPHER_SUITES_SET.add(cipherSuite); 1061 String cipherSuite = cipherSuites[i]; in setEnabledCipherSuites() local 1062 if (cipherSuite.equals(TLS_EMPTY_RENEGOTIATION_INFO_SCSV)) { in setEnabledCipherSuites() 1068 if (cipherSuite.equals(TLS_FALLBACK_SCSV) in setEnabledCipherSuites() 1074 opensslSuites.add(cipherSuiteFromJava(cipherSuite)); in setEnabledCipherSuites()
|
/external/conscrypt/repackaged/testing/src/main/java/com/android/org/conscrypt/java/security/ |
D | StandardNames.java | 199 private static void addOpenSsl(String cipherSuite) { in addOpenSsl() argument 200 CIPHER_SUITES.add(cipherSuite); in addOpenSsl() 344 for (String cipherSuite : cipherSuites) { in assertValidCipherSuites() 345 boolean removed = remainingCipherSuites.remove(cipherSuite); in assertValidCipherSuites() 347 unknownCipherSuites.add(cipherSuite); in assertValidCipherSuites()
|
/external/conscrypt/testing/src/main/java/org/conscrypt/java/security/ |
D | StandardNames.java | 197 private static void addOpenSsl(String cipherSuite) { in addOpenSsl() argument 198 CIPHER_SUITES.add(cipherSuite); in addOpenSsl() 342 for (String cipherSuite : cipherSuites) { in assertValidCipherSuites() 343 boolean removed = remainingCipherSuites.remove(cipherSuite); in assertValidCipherSuites() 345 unknownCipherSuites.add(cipherSuite); in assertValidCipherSuites()
|
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/javax/net/ssl/ |
D | SSLEngineTest.java | 197 for (String cipherSuite : cipherSuites) { in test_SSLEngine_getSupportedCipherSuites_connect() 201 && StandardNames.CIPHER_SUITES_OBSOLETE_TLS12.contains(cipherSuite)) { in test_SSLEngine_getSupportedCipherSuites_connect() 208 if (cipherSuite.equals(StandardNames.CIPHER_SUITE_SECURE_RENEGOTIATION) in test_SSLEngine_getSupportedCipherSuites_connect() 209 || cipherSuite.equals(StandardNames.CIPHER_SUITE_FALLBACK)) { in test_SSLEngine_getSupportedCipherSuites_connect() 216 if (StandardNames.CIPHER_SUITES_TLS13.contains(cipherSuite)) { in test_SSLEngine_getSupportedCipherSuites_connect() 221 ? new String[] {cipherSuite, in test_SSLEngine_getSupportedCipherSuites_connect() 223 : new String[] {cipherSuite}); in test_SSLEngine_getSupportedCipherSuites_connect() 238 && cipherSuite.contains("_CBC_"); in test_SSLEngine_getSupportedCipherSuites_connect() 255 if (cipherSuite.contains("_anon_")) { in test_SSLEngine_getSupportedCipherSuites_connect() 257 } else if (cipherSuite.startsWith("TLS_PSK_") in test_SSLEngine_getSupportedCipherSuites_connect() [all …]
|
D | SSLSessionContextTest.java | 208 String cipherSuite = i.next(); in test_SSLSessionContext_setSessionCacheSize_dynamic() local 211 if (cipherSuite.startsWith("SSL_RSA_EXPORT_")) { in test_SSLSessionContext_setSessionCacheSize_dynamic() 216 if (cipherSuite.startsWith("SSL_RSA_")) { in test_SSLSessionContext_setSessionCacheSize_dynamic() 219 if (cipherSuite.startsWith("TLS_RSA_")) { in test_SSLSessionContext_setSessionCacheSize_dynamic() 222 if (cipherSuite.startsWith("TLS_DHE_RSA_")) { in test_SSLSessionContext_setSessionCacheSize_dynamic() 225 if (cipherSuite.startsWith("SSL_DHE_RSA_")) { in test_SSLSessionContext_setSessionCacheSize_dynamic()
|
D | SSLSocketTest.java | 166 for (String cipherSuite : cipherSuites) { in test_SSLSocket_getSupportedCipherSuites_connect() 173 if (cipherSuite.equals(StandardNames.CIPHER_SUITE_SECURE_RENEGOTIATION)) { in test_SSLSocket_getSupportedCipherSuites_connect() 181 if (cipherSuite.equals(StandardNames.CIPHER_SUITE_FALLBACK)) { in test_SSLSocket_getSupportedCipherSuites_connect() 188 if (StandardNames.CIPHER_SUITES_TLS13.contains(cipherSuite)) { in test_SSLSocket_getSupportedCipherSuites_connect() 192 new String[] {cipherSuite, StandardNames.CIPHER_SUITE_SECURE_RENEGOTIATION}; in test_SSLSocket_getSupportedCipherSuites_connect() 228 String message = ("Problem trying to connect cipher suite " + cipherSuite); in test_SSLSocket_getSupportedCipherSuites_connect() 749 CipherSuite cipherSuite = clientHello.cipherSuites.get(i); in test_SSLSocket_ClientHello_cipherSuites() 750 cipherSuites[i] = cipherSuite.getAndroidName(); in test_SSLSocket_ClientHello_cipherSuites()
|
/external/conscrypt/repackaged/openjdk-integ-tests/src/test/java/com/android/org/conscrypt/javax/net/ssl/ |
D | SSLEngineTest.java | 201 for (String cipherSuite : cipherSuites) { in test_SSLEngine_getSupportedCipherSuites_connect() 205 && StandardNames.CIPHER_SUITES_OBSOLETE_TLS12.contains(cipherSuite)) { in test_SSLEngine_getSupportedCipherSuites_connect() 212 if (cipherSuite.equals(StandardNames.CIPHER_SUITE_SECURE_RENEGOTIATION) in test_SSLEngine_getSupportedCipherSuites_connect() 213 || cipherSuite.equals(StandardNames.CIPHER_SUITE_FALLBACK)) { in test_SSLEngine_getSupportedCipherSuites_connect() 220 if (StandardNames.CIPHER_SUITES_TLS13.contains(cipherSuite)) { in test_SSLEngine_getSupportedCipherSuites_connect() 225 ? new String[] {cipherSuite, in test_SSLEngine_getSupportedCipherSuites_connect() 227 : new String[] {cipherSuite}); in test_SSLEngine_getSupportedCipherSuites_connect() 242 && cipherSuite.contains("_CBC_"); in test_SSLEngine_getSupportedCipherSuites_connect() 259 if (cipherSuite.contains("_anon_")) { in test_SSLEngine_getSupportedCipherSuites_connect() 261 } else if (cipherSuite.startsWith("TLS_PSK_") in test_SSLEngine_getSupportedCipherSuites_connect() [all …]
|
D | SSLSessionContextTest.java | 213 String cipherSuite = i.next(); in test_SSLSessionContext_setSessionCacheSize_dynamic() local 216 if (cipherSuite.startsWith("SSL_RSA_EXPORT_")) { in test_SSLSessionContext_setSessionCacheSize_dynamic() 221 if (cipherSuite.startsWith("SSL_RSA_")) { in test_SSLSessionContext_setSessionCacheSize_dynamic() 224 if (cipherSuite.startsWith("TLS_RSA_")) { in test_SSLSessionContext_setSessionCacheSize_dynamic() 227 if (cipherSuite.startsWith("TLS_DHE_RSA_")) { in test_SSLSessionContext_setSessionCacheSize_dynamic() 230 if (cipherSuite.startsWith("SSL_DHE_RSA_")) { in test_SSLSessionContext_setSessionCacheSize_dynamic()
|
D | SSLSocketTest.java | 170 for (String cipherSuite : cipherSuites) { in test_SSLSocket_getSupportedCipherSuites_connect() 177 if (cipherSuite.equals(StandardNames.CIPHER_SUITE_SECURE_RENEGOTIATION)) { in test_SSLSocket_getSupportedCipherSuites_connect() 185 if (cipherSuite.equals(StandardNames.CIPHER_SUITE_FALLBACK)) { in test_SSLSocket_getSupportedCipherSuites_connect() 192 if (StandardNames.CIPHER_SUITES_TLS13.contains(cipherSuite)) { in test_SSLSocket_getSupportedCipherSuites_connect() 196 new String[] {cipherSuite, StandardNames.CIPHER_SUITE_SECURE_RENEGOTIATION}; in test_SSLSocket_getSupportedCipherSuites_connect() 232 String message = ("Problem trying to connect cipher suite " + cipherSuite); in test_SSLSocket_getSupportedCipherSuites_connect() 758 CipherSuite cipherSuite = clientHello.cipherSuites.get(i); in test_SSLSocket_ClientHello_cipherSuites() 759 cipherSuites[i] = cipherSuite.getAndroidName(); in test_SSLSocket_ClientHello_cipherSuites()
|