Home
last modified time | relevance | path

Searched refs:cipher_suite (Results 1 – 25 of 34) sorted by relevance

12

/external/libmicrohttpd/src/testcurl/https/
Dtls_test_common.h54 const char *cipher_suite; member
84 const char *cipher_suite, int proto_version,
113 send_curl_req (char *url, struct CBC *cbc, const char *cipher_suite,
117 test_https_transfer (void *cls, const char *cipher_suite, int proto_version);
138 (*test_function) (void * cls, const char *cipher_suite,
140 int daemon_flags, const char *cipher_suite, int proto_version, ...);
Dtest_https_get_parallel_threads.c65 cargs->cipher_suite, cargs->proto_version); in https_transfer_thread_adapter()
79 test_single_client (void *cls, const char *cipher_suite, in test_single_client() argument
84 { NULL, cipher_suite, curl_proto_version }; in test_single_client()
101 test_parallel_clients (void *cls, const char *cipher_suite, in test_parallel_clients() argument
109 { NULL, cipher_suite, curl_proto_version }; in test_parallel_clients()
Dtest_https_get_parallel.c64 cargs->cipher_suite, cargs->proto_version); in https_transfer_thread_adapter()
79 test_single_client (void *cls, const char *cipher_suite, in test_single_client() argument
84 { NULL, cipher_suite, curl_proto_version }; in test_single_client()
101 test_parallel_clients (void * cls, const char *cipher_suite, in test_parallel_clients() argument
109 { NULL, cipher_suite, curl_proto_version }; in test_parallel_clients()
Dtest_https_get.c43 const char *cipher_suite, in test_cipher_option() argument
62 ret = test_https_transfer (test_fd, cipher_suite, proto_version); in test_cipher_option()
72 const char *cipher_suite, in test_secure_get() argument
91 ret = test_https_transfer (test_fd, cipher_suite, proto_version); in test_secure_get()
Dtest_https_multi_daemon.c45 const char *cipher_suite, in test_concurent_daemon_pair() argument
81 test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0); in test_concurent_daemon_pair()
83 test_daemon_get (NULL, cipher_suite, proto_version, in test_concurent_daemon_pair()
88 test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0); in test_concurent_daemon_pair()
Dtls_test_common.c67 const char *cipher_suite, int proto_version, in test_daemon_get() argument
102 curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, cipher_suite); in test_daemon_get()
210 send_curl_req (char *url, struct CBC * cbc, const char *cipher_suite, in send_curl_req() argument
232 curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, cipher_suite); in send_curl_req()
316 test_https_transfer (void *cls, const char *cipher_suite, int proto_version) in test_https_transfer() argument
338 if (CURLE_OK != send_curl_req (url, &cbc, cipher_suite, proto_version)) in test_https_transfer()
452 (*test_function) (void * cls, const char *cipher_suite, in test_wrap() argument
454 int daemon_flags, const char *cipher_suite, int proto_version, ...) in test_wrap()
470 ret = test_function (NULL, cipher_suite, proto_version); in test_wrap()
Dtest_tls_authentication.c47 test_secure_get (void * cls, char *cipher_suite, int proto_version) in test_secure_get() argument
65 ret = test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0); in test_secure_get()
Dtest_tls_options.c44 test_unmatching_ssl_version (void * cls, const char *cipher_suite, in test_unmatching_ssl_version() argument
67 send_curl_req (url, &cbc, cipher_suite, curl_req_ssl_version)) in test_unmatching_ssl_version()
/external/webrtc/talk/media/base/
Dcryptoparams.h42 : tag(t), cipher_suite(cs), key_params(kp), session_params(sp) {} in CryptoParams()
45 return (tag == params.tag && cipher_suite == params.cipher_suite); in Matches()
49 std::string cipher_suite; member
/external/wpa_supplicant_8/src/tls/
Dtlsv1_record.c31 u16 cipher_suite) in tlsv1_record_set_cipher_suite() argument
37 cipher_suite); in tlsv1_record_set_cipher_suite()
38 rl->cipher_suite = cipher_suite; in tlsv1_record_set_cipher_suite()
40 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite()
78 "0x%04x", rl->cipher_suite); in tlsv1_record_change_write_cipher()
79 rl->write_cipher_suite = rl->cipher_suite; in tlsv1_record_change_write_cipher()
112 "0x%04x", rl->cipher_suite); in tlsv1_record_change_read_cipher()
113 rl->read_cipher_suite = rl->cipher_suite; in tlsv1_record_change_read_cipher()
Dtlsv1_record.h51 u16 cipher_suite; member
61 u16 cipher_suite);
Dtlsv1_server_read.c126 u16 cipher_suite; in tls_process_client_hello() local
229 cipher_suite = 0; in tls_process_client_hello()
230 for (i = 0; !cipher_suite && i < conn->num_cipher_suites; i++) { in tls_process_client_hello()
237 if (!cipher_suite && tmp == conn->cipher_suites[i]) { in tls_process_client_hello()
238 cipher_suite = tmp; in tls_process_client_hello()
244 if (!cipher_suite) { in tls_process_client_hello()
251 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { in tls_process_client_hello()
259 conn->cipher_suite = cipher_suite; in tls_process_client_hello()
834 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange()
Dtlsv1_client_read.c83 u16 cipher_suite; in tls_process_server_hello() local
172 cipher_suite = WPA_GET_BE16(pos); in tls_process_server_hello()
175 if (cipher_suite == conn->cipher_suites[i]) in tls_process_server_hello()
180 "cipher suite 0x%04x", cipher_suite); in tls_process_server_hello()
186 if (conn->session_resumed && cipher_suite != conn->prev_cipher_suite) { in tls_process_server_hello()
189 "0x%04x)", cipher_suite, conn->prev_cipher_suite); in tls_process_server_hello()
195 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { in tls_process_server_hello()
203 conn->prev_cipher_suite = cipher_suite; in tls_process_server_hello()
1080 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { in tls_process_server_key_exchange()
1089 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange()
Dtlsv1_server_i.h41 u16 cipher_suite; member
Dtlsv1_server_write.c95 WPA_PUT_BE16(pos, conn->cipher_suite); in tls_write_server_hello()
194 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_certificate()
377 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_key_exchange()
383 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { in tls_write_server_key_exchange()
/external/webrtc/webrtc/base/
Dsslstreamadapter.cc57 bool SSLStreamAdapter::GetSslCipherSuite(int* cipher_suite) { in GetSslCipherSuite() argument
94 std::string SSLStreamAdapter::SslCipherSuiteToName(int cipher_suite) { in SslCipherSuiteToName() argument
95 return OpenSSLStreamAdapter::SslCipherSuiteToName(cipher_suite); in SslCipherSuiteToName()
Dsslstreamadapter.h162 virtual bool GetSslCipherSuite(int* cipher_suite);
201 static std::string SslCipherSuiteToName(int cipher_suite);
Dopensslstreamadapter.cc356 std::string OpenSSLStreamAdapter::SslCipherSuiteToName(int cipher_suite) { in SslCipherSuiteToName() argument
358 const SSL_CIPHER* ssl_cipher = SSL_get_cipher_by_value(cipher_suite); in SslCipherSuiteToName()
369 if (cipher_suite == static_cast<int>(entry->openssl_id)) { in SslCipherSuiteToName()
377 bool OpenSSLStreamAdapter::GetSslCipherSuite(int* cipher_suite) { in GetSslCipherSuite() argument
386 *cipher_suite = static_cast<uint16_t>(SSL_CIPHER_get_id(current_cipher)); in GetSslCipherSuite()
/external/webrtc/talk/session/media/
Dsrtpfilter.cc415 if (applied_send_params_.cipher_suite == send_params.cipher_suite && in ApplyParams()
417 applied_recv_params_.cipher_suite == recv_params.cipher_suite && in ApplyParams()
432 rtc::SrtpCryptoSuiteFromName(send_params.cipher_suite), send_key, in ApplyParams()
435 rtc::SrtpCryptoSuiteFromName(recv_params.cipher_suite), recv_key, in ApplyParams()
440 << " send cipher_suite " << send_params.cipher_suite in ApplyParams()
441 << " recv cipher_suite " << recv_params.cipher_suite; in ApplyParams()
Dsrtpfilter_unittest.cc158 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F()
160 answer[0].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F()
248 answer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F()
258 offer[0].cipher_suite = answer[0].cipher_suite = "FOO"; in TEST_F()
279 answer[0].cipher_suite = "FOO"; in TEST_F()
358 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F()
369 offer[1].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F()
371 answer[0].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F()
386 offer[0].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F()
388 answer[0].cipher_suite = CS_AES_CM_128_HMAC_SHA1_32; in TEST_F()
[all …]
Dmediasession.cc108 out->cipher_suite = cipher; in CreateCryptoParams()
115 static bool AddCryptoParams(const std::string& cipher_suite, in AddCryptoParams() argument
120 return CreateCryptoParams(size, cipher_suite, &out->at(size)); in AddCryptoParams()
221 if (rtc::CS_AES_CM_128_HMAC_SHA1_80 == i->cipher_suite || in SelectCrypto()
222 (rtc::CS_AES_CM_128_HMAC_SHA1_32 == i->cipher_suite && audio && in SelectCrypto()
224 return CreateCryptoParams(i->tag, i->cipher_suite, crypto); in SelectCrypto()
618 if (it->cipher_suite == crypto.cipher_suite) { in CryptoNotFound()
/external/wpa_supplicant_8/src/pae/
Dieee802_1x_cp.c48 u64 cipher_suite; member
100 sm->current_cipher_suite != sm->cipher_suite; in changed_cipher()
198 sm->current_cipher_suite = sm->cipher_suite; in SM_STATE()
460 sm->cipher_suite = default_cs_id; in ieee802_1x_cp_sm_init()
610 sm->cipher_suite = cs; in ieee802_1x_cp_set_ciphersuite()
/external/boringssl/src/ssl/
Dtls13_client.cc171 uint16_t cipher_suite; in do_process_server_hello() local
178 !CBS_get_u16(&cbs, &cipher_suite) || in do_process_server_hello()
200 const SSL_CIPHER *cipher = SSL_get_cipher_by_value(cipher_suite); in do_process_server_hello()
Dtls13_server.cc123 uint16_t cipher_suite; in choose_tls13_cipher() local
124 if (!CBS_get_u16(&cipher_suites, &cipher_suite)) { in choose_tls13_cipher()
129 const SSL_CIPHER *candidate = SSL_get_cipher_by_value(cipher_suite); in choose_tls13_cipher()
/external/syslinux/gpxe/src/net/
Dtls.c477 unsigned int cipher_suite ) { in tls_select_cipher() argument
484 switch ( cipher_suite ) { in tls_select_cipher()
497 tls, ntohs ( cipher_suite ) ); in tls_select_cipher()
807 uint16_t cipher_suite; in tls_new_server_hello() member
834 if ( ( rc = tls_select_cipher ( tls, hello_b->cipher_suite ) ) != 0 ) in tls_new_server_hello()

12