/external/boringssl/src/tool/ |
D | ciphers.cc | 44 STACK_OF(SSL_CIPHER) *ciphers = pref_list->ciphers; in Ciphers() 47 for (size_t i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in Ciphers() 49 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in Ciphers()
|
D | CMakeLists.txt | 7 ciphers.cc
|
/external/curl/lib/vtls/ |
D | gskit.c | 305 } ciphers[CURL_GSKPROTO_LAST]; in set_ciphers() local 320 memset((char *) ciphers, 0, sizeof ciphers); in set_ciphers() 322 ciphers[i].buf = malloc(l); in set_ciphers() 323 if(!ciphers[i].buf) { in set_ciphers() 325 free(ciphers[i].buf); in set_ciphers() 328 ciphers[i].ptr = ciphers[i].buf; in set_ciphers() 329 *ciphers[i].ptr = '\0'; in set_ciphers() 354 strcpy(ciphers[i].ptr, ctp->gsktoken); in set_ciphers() 355 ciphers[i].ptr += strlen(ctp->gsktoken); in set_ciphers() 367 if(!(*protoflags & (1 << i)) || !ciphers[i].buf[0]) { in set_ciphers() [all …]
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 1489 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument 1493 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites() 1497 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites() 1501 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites() 1505 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites() 1509 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites() 1513 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites() 1522 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument 1526 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites() 1530 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites() [all …]
|
D | wpa_common.h | 444 int rsn_cipher_put_suites(u8 *pos, int ciphers); 445 int wpa_cipher_put_suites(u8 *pos, int ciphers); 446 int wpa_pick_pairwise_cipher(int ciphers, int none_allowed); 447 int wpa_pick_group_cipher(int ciphers); 449 int wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim);
|
/external/curl/docs/ |
D | SSL-PROBLEMS | 39 SSL ciphers 41 Clients give servers a list of ciphers to select from. If the list doesn't 42 include any ciphers the server wants/can use, the connection handshake 46 ciphers from its default set (slightly depending on SSL backend in use). 48 You may have to explicitly provide an alternative list of ciphers for curl 51 Note that these weak ciphers are identified as flawed. For example, this 52 includes symmetric ciphers with less than 128 bit keys and RC4.
|
/external/webrtc/webrtc/p2p/base/ |
D | transportchannel.cc | 57 bool TransportChannel::SetSrtpCryptoSuites(const std::vector<int>& ciphers) { in SetSrtpCryptoSuites() argument 62 bool TransportChannel::SetSrtpCiphers(const std::vector<std::string>& ciphers) { in SetSrtpCiphers() argument 64 for (const auto cipher : ciphers) { in SetSrtpCiphers()
|
D | dtlstransportchannel.cc | 295 const std::vector<int>& ciphers) { in SetSrtpCryptoSuites() argument 296 if (srtp_ciphers_ == ciphers) in SetSrtpCryptoSuites() 314 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher); in SetSrtpCryptoSuites() 315 if (iter == ciphers.end()) { in SetSrtpCryptoSuites() 317 for (size_t i = 0; i < ciphers.size(); ++i) { in SetSrtpCryptoSuites() 319 requested_str.append(rtc::SrtpCryptoSuiteToName(ciphers[i])); in SetSrtpCryptoSuites() 334 srtp_ciphers_ = ciphers; in SetSrtpCryptoSuites()
|
D | transportchannel.h | 113 virtual bool SetSrtpCryptoSuites(const std::vector<int>& ciphers); 117 virtual bool SetSrtpCiphers(const std::vector<std::string>& ciphers);
|
D | faketransportcontroller.h | 245 bool SetSrtpCryptoSuites(const std::vector<int>& ciphers) override { in SetSrtpCryptoSuites() argument 246 srtp_ciphers_ = ciphers; in SetSrtpCryptoSuites()
|
/external/boringssl/src/ssl/ |
D | ssl_test.cc | 295 for (size_t i = 0; i < sk_SSL_CIPHER_num(list->ciphers); i++) { in PrintCipherPreferenceList() 296 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(list->ciphers, i); in PrintCipherPreferenceList() 326 for (i = 0; i < sk_SSL_CIPHER_num(ctx->cipher_list->ciphers); i++) { in TestCipherRule() 328 sk_SSL_CIPHER_value(ctx->cipher_list->ciphers, i); in TestCipherRule() 355 for (size_t i = 0; i < sk_SSL_CIPHER_num(ctx->cipher_list->ciphers); i++) { in TestRuleDoesNotIncludeNull() 356 if (SSL_CIPHER_is_NULL(sk_SSL_CIPHER_value(ctx->cipher_list->ciphers, i))) { in TestRuleDoesNotIncludeNull()
|
D | s3_srvr.c | 772 STACK_OF(SSL_CIPHER) *ciphers = NULL; in ssl3_get_client_hello() 976 ciphers = ssl_bytes_to_cipher_list(ssl, &cipher_suites); in ssl3_get_client_hello() 977 if (ciphers == NULL) { in ssl3_get_client_hello() 987 for (j = 0; j < sk_SSL_CIPHER_num(ciphers); j++) { in ssl3_get_client_hello() 988 c = sk_SSL_CIPHER_value(ciphers, j); in ssl3_get_client_hello() 1035 if (ciphers == NULL) { in ssl3_get_client_hello() 1055 c = ssl3_choose_cipher(ssl, ciphers, ssl_get_cipher_preferences(ssl)); in ssl3_get_client_hello() 1110 sk_SSL_CIPHER_free(ciphers); in ssl3_get_client_hello()
|
/external/srtp/crypto/ |
D | Makefile.in | 69 ciphers = cipher/cipher.o cipher/null_cipher.o \ 87 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(xfm)
|
D | Makefile | 69 ciphers = cipher/cipher.o cipher/null_cipher.o \ macro 87 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(xfm)
|
/external/srtp/ |
D | README | 49 crypto/ciphers/ ciphers (null, aes_icm, ...) 67 kernel_driver crypto kernel (ciphers, auth funcs, rng) 72 cipher_driver ciphers
|
D | Makefile | 75 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \ macro 96 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(replay)
|
D | Makefile.in | 77 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \ 98 cryptobj = $(ciphers) $(hashes) $(math) $(stat) $(kernel) $(replay)
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ie.c | 480 int ciphers, key_mgmt, res, version; in wpa_validate_wpa_ie() local 618 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; in wpa_validate_wpa_ie() 620 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; in wpa_validate_wpa_ie() 621 if (!ciphers) { in wpa_validate_wpa_ie() 637 if (ciphers & WPA_CIPHER_TKIP) { in wpa_validate_wpa_ie() 674 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_fast.c | 1445 u8 ciphers[7]; in eap_fast_set_provisioning_ciphers() local 1451 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1457 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES256_SHA; in eap_fast_set_provisioning_ciphers() 1458 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1459 ciphers[count++] = TLS_CIPHER_AES256_SHA; in eap_fast_set_provisioning_ciphers() 1460 ciphers[count++] = TLS_CIPHER_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1461 ciphers[count++] = TLS_CIPHER_RC4_SHA; in eap_fast_set_provisioning_ciphers() 1464 ciphers[count++] = TLS_CIPHER_NONE; in eap_fast_set_provisioning_ciphers() 1467 ciphers)) { in eap_fast_set_provisioning_ciphers()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_server.h | 37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
|
D | tlsv1_client.h | 41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
|
/external/libvncserver/webclients/java-applet/ssl/ |
D | ss_vncviewer | 212 ciphers="" 276 "-anondh") ciphers="ciphers=$anondh" 281 "-ciphers") shift; ciphers="ciphers=$1" 3153 if [ "X$ciphers" != "X" ]; then 3154 cipher_args=`echo "$ciphers" | sed -e 's/ciphers=/-cipher /'` 3455 $ciphers 3507 $ciphers
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_internal.c | 633 u8 *ciphers) in tls_connection_set_cipher_list() argument 637 return tlsv1_client_set_cipher_list(conn->client, ciphers); in tls_connection_set_cipher_list() 641 return tlsv1_server_set_cipher_list(conn->server, ciphers); in tls_connection_set_cipher_list()
|
D | tls_none.c | 138 u8 *ciphers) in tls_connection_set_cipher_list() argument
|
/external/webrtc/webrtc/base/ |
D | opensslstreamadapter.cc | 414 const std::vector<int>& ciphers) { in SetDtlsSrtpCryptoSuites() argument 421 for (std::vector<int>::const_iterator cipher = ciphers.begin(); in SetDtlsSrtpCryptoSuites() 422 cipher != ciphers.end(); ++cipher) { in SetDtlsSrtpCryptoSuites()
|