Home
last modified time | relevance | path

Searched refs:ciphers (Results 1 – 25 of 218) sorted by relevance

123456789

/external/curl/docs/cmdline-opts/
Dciphers.d1 Long: ciphers
2 Arg: <list of ciphers>
3 Help: SSL ciphers to use
6 Specifies which ciphers to use in the connection. The list of ciphers must
7 specify valid ciphers. Read up on SSL cipher list details on this URL:
Dproxy-tls13-ciphers.d1 Long: proxy-tls13-ciphers
7 when it negotiates TLS 1.3. The list of ciphers suites must specify valid
8 ciphers. Read up on TLS 1.3 cipher suite details on this URL:
14 cipher suites by using the --proxy-ciphers option.
Dtls13-ciphers.d1 Long: tls13-ciphers
7 1.3. The list of ciphers suites must specify valid ciphers. Read up on TLS 1.3
14 cipher suites by using the --ciphers option.
Dproxy-ciphers.d1 Long: proxy-ciphers
3 Help: SSL ciphers to use for proxy
6 Same as --ciphers but used in HTTPS proxy context.
/external/openssh/regress/
Dssh-com.sh90 ciphers="3des-cbc blowfish-cbc arcfour"
94 ciphers="$ciphers cast128-cbc"
98 ciphers="$ciphers aes128-cbc cast128-cbc"
104 for c in $ciphers; do
Dtry-ciphers.sh30 ciphers="3des blowfish"
32 ciphers=""
34 for c in $ciphers; do
/external/python/cryptography/tests/hazmat/primitives/
Dtest_ciphers.py14 from cryptography.hazmat.primitives import ciphers
15 from cryptography.hazmat.primitives.ciphers import modes
16 from cryptography.hazmat.primitives.ciphers.algorithms import (
52 ciphers.Cipher(AES(b"0" * 64), mode(b"0" * 16), backend)
65 ciphers.Cipher(AES(b"0" * 16), modes.XTS(b"0" * 16), backend)
195 ciphers.Cipher(AES(b"AAAAAAAAAAAAAAAA"), modes.ECB, pretend_backend)
217 c = ciphers.Cipher(AES(key), modes.ECB(), backend)
235 c = ciphers.Cipher(AES(key), modes.GCM(iv), backend)
242 c = ciphers.Cipher(AES(key), modes.GCM(iv, encryptor.tag), backend)
258 encryptor = ciphers.Cipher(
[all …]
/external/python/cryptography/docs/hazmat/primitives/
Dsymmetric-encryption.rst7 .. module:: cryptography.hazmat.primitives.ciphers
26 :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` with a
28 :class:`~cryptography.hazmat.primitives.ciphers.modes.CBC` or
29 :class:`~cryptography.hazmat.primitives.ciphers.modes.CTR`. A simple
35 >>> from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
48 :class:`~cryptography.hazmat.primitives.ciphers.CipherAlgorithm`
51 :param mode: A :class:`~cryptography.hazmat.primitives.ciphers.modes.Mode`
65 :class:`~cryptography.hazmat.primitives.ciphers.CipherContext`
75 :class:`~cryptography.hazmat.primitives.ciphers.CipherContext`
87 .. currentmodule:: cryptography.hazmat.primitives.ciphers.algorithms
[all …]
/external/conscrypt/benchmark-android/src/main/java/org/conscrypt/
DAndroidEndpointFactory.java26 String[] ciphers) throws IOException { in newClient() argument
28 factories.clientFactory, channelType, port, protocols, ciphers); in newClient()
33 String[] protocols, String[] ciphers) throws IOException { in newServer() argument
35 channelType, messageSize, protocols, ciphers); in newServer()
/external/conscrypt/repackaged/benchmark-android/src/main/java/com/android/org/conscrypt/
DAndroidEndpointFactory.java28 String[] ciphers) throws IOException { in newClient() argument
30 factories.clientFactory, channelType, port, protocols, ciphers); in newClient()
35 String[] protocols, String[] ciphers) throws IOException { in newServer() argument
37 channelType, messageSize, protocols, ciphers); in newServer()
/external/curl/lib/vtls/
Dgskit.c318 } ciphers[CURL_GSKPROTO_LAST]; in set_ciphers() local
333 memset((char *) ciphers, 0, sizeof(ciphers)); in set_ciphers()
335 ciphers[i].buf = malloc(l); in set_ciphers()
336 if(!ciphers[i].buf) { in set_ciphers()
338 free(ciphers[i].buf); in set_ciphers()
341 ciphers[i].ptr = ciphers[i].buf; in set_ciphers()
342 *ciphers[i].ptr = '\0'; in set_ciphers()
367 strcpy(ciphers[i].ptr, ctp->gsktoken); in set_ciphers()
368 ciphers[i].ptr += strlen(ctp->gsktoken); in set_ciphers()
380 if(!(*protoflags & (1 << i)) || !ciphers[i].buf[0]) { in set_ciphers()
[all …]
/external/conscrypt/benchmark-jmh/src/jmh/java/org/conscrypt/
DOpenJdkEndpointFactory.java28 String[] ciphers) throws IOException { in newClient() argument
30 factories.clientFactory, channelType, port, protocols, ciphers); in newClient()
35 String[] protocols, String[] ciphers) throws IOException { in newServer() argument
37 channelType, messageSize, protocols, ciphers); in newServer()
/external/boringssl/src/tool/
Dciphers.cc45 STACK_OF(SSL_CIPHER) *ciphers = SSL_CTX_get_ciphers(ctx.get()); in Ciphers()
48 for (size_t i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in Ciphers()
50 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in Ciphers()
/external/webrtc/webrtc/p2p/base/
Dtransportchannel.cc57 bool TransportChannel::SetSrtpCryptoSuites(const std::vector<int>& ciphers) { in SetSrtpCryptoSuites() argument
62 bool TransportChannel::SetSrtpCiphers(const std::vector<std::string>& ciphers) { in SetSrtpCiphers() argument
64 for (const auto cipher : ciphers) { in SetSrtpCiphers()
Ddtlstransportchannel.cc295 const std::vector<int>& ciphers) { in SetSrtpCryptoSuites() argument
296 if (srtp_ciphers_ == ciphers) in SetSrtpCryptoSuites()
314 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher); in SetSrtpCryptoSuites()
315 if (iter == ciphers.end()) { in SetSrtpCryptoSuites()
317 for (size_t i = 0; i < ciphers.size(); ++i) { in SetSrtpCryptoSuites()
319 requested_str.append(rtc::SrtpCryptoSuiteToName(ciphers[i])); in SetSrtpCryptoSuites()
334 srtp_ciphers_ = ciphers; in SetSrtpCryptoSuites()
/external/python/cryptography/src/cryptography/hazmat/backends/openssl/
Dciphers.py9 from cryptography.hazmat.primitives import ciphers
10 from cryptography.hazmat.primitives.ciphers import modes
13 @utils.register_interface(ciphers.CipherContext)
14 @utils.register_interface(ciphers.AEADCipherContext)
15 @utils.register_interface(ciphers.AEADEncryptionContext)
16 @utils.register_interface(ciphers.AEADDecryptionContext)
28 if isinstance(self._cipher, ciphers.BlockCipherAlgorithm):
/external/curl/docs/
DCIPHERS.md6 [`--ciphers`](https://curl.haxx.se/docs/manpage.html#--ciphers)
7 users can control which ciphers to consider when negotiating TLS connections.
9 TLS 1.3 ciphers are supported since curl 7.61 for OpenSSL 1.1.1+ with options
12 [`--tls13-ciphers`](https://curl.haxx.se/docs/manpage.html#--tls13-ciphers)
16 The names of the known ciphers differ depending on which TLS backend that
21 (based on [OpenSSL docs](https://www.openssl.org/docs/man1.1.0/apps/ciphers.html))
159 (Note these ciphers are set with `CURLOPT_TLS13_CIPHERS` and `--tls13-ciphers`)
200 ### AES ciphers
209 ### ECC ciphers
465 protocol or does not match the ciphers offered by the server during the SSL
DSSL-PROBLEMS.md43 Clients give servers a list of ciphers to select from. If the list doesn't
44 include any ciphers the server wants/can use, the connection handshake
48 ciphers from its default set (slightly depending on SSL backend in use).
50 You may have to explicitly provide an alternative list of ciphers for curl
53 Note that these weak ciphers are identified as flawed. For example, this
54 includes symmetric ciphers with less than 128 bit keys and RC4.
/external/python/cryptography/docs/development/custom-vectors/arc4/
Dgenerate_arc4.py10 from cryptography.hazmat.primitives import ciphers
11 from cryptography.hazmat.primitives.ciphers import algorithms
65 cipher = ciphers.Cipher(
/external/wpa_supplicant_8/src/common/
Dwpa_common.c2368 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument
2372 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites()
2376 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites()
2380 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites()
2384 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites()
2388 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites()
2392 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites()
2401 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument
2405 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites()
2409 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites()
[all …]
/external/conscrypt/benchmark-base/src/main/java/org/conscrypt/
DEndpointFactory.java10 String[] ciphers) throws IOException; in newClient() argument
13 String[] protocols, String[] ciphers) throws IOException; in newServer() argument
DClientSocketBenchmark.java63 ciphers(config)); in ClientSocketBenchmark()
77 config.channelType(), server.port(), config.protocol().getProtocols(), ciphers(config)); in ClientSocketBenchmark()
144 private String[] ciphers(Config config) { in ciphers() method in ClientSocketBenchmark
/external/conscrypt/repackaged/benchmark-base/src/main/java/com/android/org/conscrypt/
DEndpointFactory.java11 String[] ciphers) throws IOException; in newClient() argument
14 String[] protocols, String[] ciphers) throws IOException; in newServer() argument
/external/boringssl/src/ssl/
Dhandoff.cc30 CBB ciphers; in serialize_features() local
31 if (!CBB_add_asn1(out, &ciphers, CBS_ASN1_OCTETSTRING)) { in serialize_features()
36 if (!CBB_add_u16(&ciphers, static_cast<uint16_t>(cipher.id))) { in serialize_features()
97 CBS ciphers; in apply_remote_features() local
98 if (!CBS_get_asn1(in, &ciphers, CBS_ASN1_OCTETSTRING)) { in apply_remote_features()
102 while (CBS_len(&ciphers)) { in apply_remote_features()
104 if (!CBS_get_u16(&ciphers, &id)) { in apply_remote_features()
116 ssl->config->cipher_list ? ssl->config->cipher_list->ciphers.get() in apply_remote_features()
117 : ssl->ctx->cipher_list->ciphers.get(); in apply_remote_features()
/external/python/cryptography/docs/hazmat/primitives/mac/
Dcmac.rst25 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm` instance.
31 >>> from cryptography.hazmat.primitives.ciphers import algorithms
42 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`
58 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`.
62 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`

123456789