/external/curl/docs/cmdline-opts/ |
D | ciphers.d | 1 Long: ciphers 2 Arg: <list of ciphers> 3 Help: SSL ciphers to use 6 Specifies which ciphers to use in the connection. The list of ciphers must 7 specify valid ciphers. Read up on SSL cipher list details on this URL:
|
D | proxy-tls13-ciphers.d | 1 Long: proxy-tls13-ciphers 7 when it negotiates TLS 1.3. The list of ciphers suites must specify valid 8 ciphers. Read up on TLS 1.3 cipher suite details on this URL: 14 cipher suites by using the --proxy-ciphers option.
|
D | tls13-ciphers.d | 1 Long: tls13-ciphers 7 1.3. The list of ciphers suites must specify valid ciphers. Read up on TLS 1.3 14 cipher suites by using the --ciphers option.
|
D | proxy-ciphers.d | 1 Long: proxy-ciphers 3 Help: SSL ciphers to use for proxy 6 Same as --ciphers but used in HTTPS proxy context.
|
/external/openssh/regress/ |
D | ssh-com.sh | 90 ciphers="3des-cbc blowfish-cbc arcfour" 94 ciphers="$ciphers cast128-cbc" 98 ciphers="$ciphers aes128-cbc cast128-cbc" 104 for c in $ciphers; do
|
D | try-ciphers.sh | 30 ciphers="3des blowfish" 32 ciphers="" 34 for c in $ciphers; do
|
/external/python/cryptography/tests/hazmat/primitives/ |
D | test_ciphers.py | 14 from cryptography.hazmat.primitives import ciphers 15 from cryptography.hazmat.primitives.ciphers import modes 16 from cryptography.hazmat.primitives.ciphers.algorithms import ( 52 ciphers.Cipher(AES(b"0" * 64), mode(b"0" * 16), backend) 65 ciphers.Cipher(AES(b"0" * 16), modes.XTS(b"0" * 16), backend) 195 ciphers.Cipher(AES(b"AAAAAAAAAAAAAAAA"), modes.ECB, pretend_backend) 217 c = ciphers.Cipher(AES(key), modes.ECB(), backend) 235 c = ciphers.Cipher(AES(key), modes.GCM(iv), backend) 242 c = ciphers.Cipher(AES(key), modes.GCM(iv, encryptor.tag), backend) 258 encryptor = ciphers.Cipher( [all …]
|
/external/python/cryptography/docs/hazmat/primitives/ |
D | symmetric-encryption.rst | 7 .. module:: cryptography.hazmat.primitives.ciphers 26 :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` with a 28 :class:`~cryptography.hazmat.primitives.ciphers.modes.CBC` or 29 :class:`~cryptography.hazmat.primitives.ciphers.modes.CTR`. A simple 35 >>> from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes 48 :class:`~cryptography.hazmat.primitives.ciphers.CipherAlgorithm` 51 :param mode: A :class:`~cryptography.hazmat.primitives.ciphers.modes.Mode` 65 :class:`~cryptography.hazmat.primitives.ciphers.CipherContext` 75 :class:`~cryptography.hazmat.primitives.ciphers.CipherContext` 87 .. currentmodule:: cryptography.hazmat.primitives.ciphers.algorithms [all …]
|
/external/conscrypt/benchmark-android/src/main/java/org/conscrypt/ |
D | AndroidEndpointFactory.java | 26 String[] ciphers) throws IOException { in newClient() argument 28 factories.clientFactory, channelType, port, protocols, ciphers); in newClient() 33 String[] protocols, String[] ciphers) throws IOException { in newServer() argument 35 channelType, messageSize, protocols, ciphers); in newServer()
|
/external/conscrypt/repackaged/benchmark-android/src/main/java/com/android/org/conscrypt/ |
D | AndroidEndpointFactory.java | 28 String[] ciphers) throws IOException { in newClient() argument 30 factories.clientFactory, channelType, port, protocols, ciphers); in newClient() 35 String[] protocols, String[] ciphers) throws IOException { in newServer() argument 37 channelType, messageSize, protocols, ciphers); in newServer()
|
/external/curl/lib/vtls/ |
D | gskit.c | 318 } ciphers[CURL_GSKPROTO_LAST]; in set_ciphers() local 333 memset((char *) ciphers, 0, sizeof(ciphers)); in set_ciphers() 335 ciphers[i].buf = malloc(l); in set_ciphers() 336 if(!ciphers[i].buf) { in set_ciphers() 338 free(ciphers[i].buf); in set_ciphers() 341 ciphers[i].ptr = ciphers[i].buf; in set_ciphers() 342 *ciphers[i].ptr = '\0'; in set_ciphers() 367 strcpy(ciphers[i].ptr, ctp->gsktoken); in set_ciphers() 368 ciphers[i].ptr += strlen(ctp->gsktoken); in set_ciphers() 380 if(!(*protoflags & (1 << i)) || !ciphers[i].buf[0]) { in set_ciphers() [all …]
|
/external/conscrypt/benchmark-jmh/src/jmh/java/org/conscrypt/ |
D | OpenJdkEndpointFactory.java | 28 String[] ciphers) throws IOException { in newClient() argument 30 factories.clientFactory, channelType, port, protocols, ciphers); in newClient() 35 String[] protocols, String[] ciphers) throws IOException { in newServer() argument 37 channelType, messageSize, protocols, ciphers); in newServer()
|
/external/boringssl/src/tool/ |
D | ciphers.cc | 45 STACK_OF(SSL_CIPHER) *ciphers = SSL_CTX_get_ciphers(ctx.get()); in Ciphers() 48 for (size_t i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in Ciphers() 50 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in Ciphers()
|
/external/webrtc/webrtc/p2p/base/ |
D | transportchannel.cc | 57 bool TransportChannel::SetSrtpCryptoSuites(const std::vector<int>& ciphers) { in SetSrtpCryptoSuites() argument 62 bool TransportChannel::SetSrtpCiphers(const std::vector<std::string>& ciphers) { in SetSrtpCiphers() argument 64 for (const auto cipher : ciphers) { in SetSrtpCiphers()
|
D | dtlstransportchannel.cc | 295 const std::vector<int>& ciphers) { in SetSrtpCryptoSuites() argument 296 if (srtp_ciphers_ == ciphers) in SetSrtpCryptoSuites() 314 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher); in SetSrtpCryptoSuites() 315 if (iter == ciphers.end()) { in SetSrtpCryptoSuites() 317 for (size_t i = 0; i < ciphers.size(); ++i) { in SetSrtpCryptoSuites() 319 requested_str.append(rtc::SrtpCryptoSuiteToName(ciphers[i])); in SetSrtpCryptoSuites() 334 srtp_ciphers_ = ciphers; in SetSrtpCryptoSuites()
|
/external/python/cryptography/src/cryptography/hazmat/backends/openssl/ |
D | ciphers.py | 9 from cryptography.hazmat.primitives import ciphers 10 from cryptography.hazmat.primitives.ciphers import modes 13 @utils.register_interface(ciphers.CipherContext) 14 @utils.register_interface(ciphers.AEADCipherContext) 15 @utils.register_interface(ciphers.AEADEncryptionContext) 16 @utils.register_interface(ciphers.AEADDecryptionContext) 28 if isinstance(self._cipher, ciphers.BlockCipherAlgorithm):
|
/external/curl/docs/ |
D | CIPHERS.md | 6 [`--ciphers`](https://curl.haxx.se/docs/manpage.html#--ciphers) 7 users can control which ciphers to consider when negotiating TLS connections. 9 TLS 1.3 ciphers are supported since curl 7.61 for OpenSSL 1.1.1+ with options 12 [`--tls13-ciphers`](https://curl.haxx.se/docs/manpage.html#--tls13-ciphers) 16 The names of the known ciphers differ depending on which TLS backend that 21 (based on [OpenSSL docs](https://www.openssl.org/docs/man1.1.0/apps/ciphers.html)) 159 (Note these ciphers are set with `CURLOPT_TLS13_CIPHERS` and `--tls13-ciphers`) 200 ### AES ciphers 209 ### ECC ciphers 465 protocol or does not match the ciphers offered by the server during the SSL
|
D | SSL-PROBLEMS.md | 43 Clients give servers a list of ciphers to select from. If the list doesn't 44 include any ciphers the server wants/can use, the connection handshake 48 ciphers from its default set (slightly depending on SSL backend in use). 50 You may have to explicitly provide an alternative list of ciphers for curl 53 Note that these weak ciphers are identified as flawed. For example, this 54 includes symmetric ciphers with less than 128 bit keys and RC4.
|
/external/python/cryptography/docs/development/custom-vectors/arc4/ |
D | generate_arc4.py | 10 from cryptography.hazmat.primitives import ciphers 11 from cryptography.hazmat.primitives.ciphers import algorithms 65 cipher = ciphers.Cipher(
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 2368 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument 2372 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites() 2376 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites() 2380 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites() 2384 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites() 2388 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites() 2392 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites() 2401 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument 2405 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites() 2409 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites() [all …]
|
/external/conscrypt/benchmark-base/src/main/java/org/conscrypt/ |
D | EndpointFactory.java | 10 String[] ciphers) throws IOException; in newClient() argument 13 String[] protocols, String[] ciphers) throws IOException; in newServer() argument
|
D | ClientSocketBenchmark.java | 63 ciphers(config)); in ClientSocketBenchmark() 77 config.channelType(), server.port(), config.protocol().getProtocols(), ciphers(config)); in ClientSocketBenchmark() 144 private String[] ciphers(Config config) { in ciphers() method in ClientSocketBenchmark
|
/external/conscrypt/repackaged/benchmark-base/src/main/java/com/android/org/conscrypt/ |
D | EndpointFactory.java | 11 String[] ciphers) throws IOException; in newClient() argument 14 String[] protocols, String[] ciphers) throws IOException; in newServer() argument
|
/external/boringssl/src/ssl/ |
D | handoff.cc | 30 CBB ciphers; in serialize_features() local 31 if (!CBB_add_asn1(out, &ciphers, CBS_ASN1_OCTETSTRING)) { in serialize_features() 36 if (!CBB_add_u16(&ciphers, static_cast<uint16_t>(cipher.id))) { in serialize_features() 97 CBS ciphers; in apply_remote_features() local 98 if (!CBS_get_asn1(in, &ciphers, CBS_ASN1_OCTETSTRING)) { in apply_remote_features() 102 while (CBS_len(&ciphers)) { in apply_remote_features() 104 if (!CBS_get_u16(&ciphers, &id)) { in apply_remote_features() 116 ssl->config->cipher_list ? ssl->config->cipher_list->ciphers.get() in apply_remote_features() 117 : ssl->ctx->cipher_list->ciphers.get(); in apply_remote_features()
|
/external/python/cryptography/docs/hazmat/primitives/mac/ |
D | cmac.rst | 25 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm` instance. 31 >>> from cryptography.hazmat.primitives.ciphers import algorithms 42 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm` 58 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`. 62 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`
|