/external/chromium/net/base/ |
D | ssl_cipher_suite_names.cc | 27 uint16 cipher_suite, encoded; member 304 if (a->cipher_suite < b->cipher_suite) { in CipherSuiteCmp() 306 } else if (a->cipher_suite == b->cipher_suite) { in CipherSuiteCmp() 315 const char** mac_str, uint16 cipher_suite) { in SSLCipherSuiteToStrings() argument 319 desired.cipher_suite = cipher_suite; in SSLCipherSuiteToStrings()
|
D | ssl_cipher_suite_names.h | 21 uint16 cipher_suite);
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
D | ServerHelloTest.java | 34 CipherSuite cipher_suite = CipherSuite.TLS_DH_DSS_WITH_DES_CBC_SHA; in testServerHello() local 37 server_version, session_id, cipher_suite, (byte) 0); in testServerHello() 45 assertEquals("incorrect CertificateRequest", cipher_suite, in testServerHello() 46 message.cipher_suite); in testServerHello() 64 assertEquals("incorrect message decoding", message.cipher_suite, in testServerHello() 65 message_2.cipher_suite); in testServerHello()
|
D | ClientHelloTest.java | 41 CipherSuite[] cipher_suite = new CipherSuite[] { in testClientHello() local 44 ses_id, cipher_suite); in testClientHello()
|
D | ServerHandshakeImplTest.java | 69 CipherSuite[] cipher_suite = new CipherSuite[] { in testUnwrap() local 72 ses_id, cipher_suite); in testUnwrap()
|
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
D | cryptoparams.h | 40 : tag(t), cipher_suite(cs), key_params(kp), session_params(sp) {} in CryptoParams() 43 return (tag == params.tag && cipher_suite == params.cipher_suite); in Matches() 47 std::string cipher_suite; member
|
D | srtpfilter.cc | 198 ret = (send_session_.SetSend(send_params.cipher_suite, in ApplyParams() 200 recv_session_.SetRecv(recv_params.cipher_suite, in ApplyParams() 207 << " send cipher_suite " << send_params.cipher_suite in ApplyParams() 208 << " recv cipher_suite " << recv_params.cipher_suite; in ApplyParams()
|
D | mediasessionclient.cc | 107 out->cipher_suite = cipher; in CreateCryptoParams() 112 bool AddCryptoParams(const std::string& cipher_suite, CryptoParamsVec *out) { in AddCryptoParams() argument 116 return CreateCryptoParams(size, cipher_suite, &out->at(size)); in AddCryptoParams() 245 if (CS_AES_CM_128_HMAC_SHA1_80 == i->cipher_suite || in SelectCrypto() 246 (CS_AES_CM_128_HMAC_SHA1_32 == i->cipher_suite && audio)) { in SelectCrypto() 247 return CreateCryptoParams(i->tag, i->cipher_suite, crypto); in SelectCrypto() 817 crypto_elem->AddAttr(QN_CRYPTO_SUITE, i->cipher_suite); in CreateJingleEncryptionElem()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_record.c | 31 u16 cipher_suite) in tlsv1_record_set_cipher_suite() argument 37 cipher_suite); in tlsv1_record_set_cipher_suite() 38 rl->cipher_suite = cipher_suite; in tlsv1_record_set_cipher_suite() 40 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite() 78 "0x%04x", rl->cipher_suite); in tlsv1_record_change_write_cipher() 79 rl->write_cipher_suite = rl->cipher_suite; in tlsv1_record_change_write_cipher() 112 "0x%04x", rl->cipher_suite); in tlsv1_record_change_read_cipher() 113 rl->read_cipher_suite = rl->cipher_suite; in tlsv1_record_change_read_cipher()
|
D | tlsv1_record.h | 51 u16 cipher_suite; member 61 u16 cipher_suite);
|
D | tlsv1_client_read.c | 35 u16 cipher_suite; in tls_process_server_hello() local 123 cipher_suite = WPA_GET_BE16(pos); in tls_process_server_hello() 126 if (cipher_suite == conn->cipher_suites[i]) in tls_process_server_hello() 131 "cipher suite 0x%04x", cipher_suite); in tls_process_server_hello() 137 if (conn->session_resumed && cipher_suite != conn->prev_cipher_suite) { in tls_process_server_hello() 140 "0x%04x)", cipher_suite, conn->prev_cipher_suite); in tls_process_server_hello() 146 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { in tls_process_server_hello() 154 conn->prev_cipher_suite = cipher_suite; in tls_process_server_hello() 536 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { in tls_process_server_key_exchange() 545 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange()
|
D | tlsv1_server_read.c | 35 u16 cipher_suite; in tls_process_client_hello() local 138 cipher_suite = 0; in tls_process_client_hello() 139 for (i = 0; !cipher_suite && i < conn->num_cipher_suites; i++) { in tls_process_client_hello() 144 if (!cipher_suite && tmp == conn->cipher_suites[i]) { in tls_process_client_hello() 145 cipher_suite = tmp; in tls_process_client_hello() 151 if (!cipher_suite) { in tls_process_client_hello() 159 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { in tls_process_client_hello() 167 conn->cipher_suite = cipher_suite; in tls_process_client_hello() 744 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange()
|
D | tlsv1_server_i.h | 41 u16 cipher_suite; member
|
D | tlsv1_server_write.c | 95 WPA_PUT_BE16(pos, conn->cipher_suite); in tls_write_server_hello() 164 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_certificate() 253 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_key_exchange() 259 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { in tls_write_server_key_exchange()
|
D | tlsv1_server.c | 466 switch (conn->rl.cipher_suite) { in tlsv1_server_get_cipher()
|
D | tlsv1_client.c | 555 switch (conn->rl.cipher_suite) { in tlsv1_client_get_cipher()
|
D | tlsv1_client_write.c | 379 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_client_key_exchange()
|
/external/chromium/chrome/browser/ |
D | page_info_model.cc | 206 uint16 cipher_suite = in PageInfoModel() local 208 if (ssl.security_bits() > 0 && cipher_suite) { in PageInfoModel() 224 net::SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, cipher_suite); in PageInfoModel()
|
/external/chromium/net/socket/ |
D | ssl_client_socket_mac.cc | 462 bool operator()(SSLCipherSuite cipher_suite) const { in operator ()() 465 static_cast<uint16>(cipher_suite)); in operator ()()
|
D | ssl_client_socket_openssl.cc | 51 int EncodeSSLConnectionStatus(int cipher_suite, in EncodeSSLConnectionStatus() argument 54 return ((cipher_suite & SSL_CONNECTION_CIPHERSUITE_MASK) << in EncodeSSLConnectionStatus()
|
D | ssl_client_socket_nss.cc | 527 PRUint16 cipher_suite = in GetSSLInfo() local 530 SECStatus ok = SSL_GetCipherSuiteInfo(cipher_suite, in GetSSLInfo() 537 << " for cipherSuite " << cipher_suite; in GetSSLInfo()
|
/external/chromium/net/url_request/ |
D | url_request_unittest.cc | 119 int cipher_suite = SSLConnectionStatusToCipherSuite( in CheckSSLInfo() local 121 EXPECT_NE(0, cipher_suite); in CheckSSLInfo()
|