Home
last modified time | relevance | path

Searched refs:ciphers (Results 1 – 25 of 225) sorted by relevance

123456789

/external/curl/docs/cmdline-opts/
Dciphers.d1 Long: ciphers
2 Arg: <list of ciphers>
3 Help: SSL ciphers to use
7 Specifies which ciphers to use in the connection. The list of ciphers must
8 specify valid ciphers. Read up on SSL cipher list details on this URL:
Dproxy-tls13-ciphers.d1 Long: proxy-tls13-ciphers
8 when it negotiates TLS 1.3. The list of ciphers suites must specify valid
9 ciphers. Read up on TLS 1.3 cipher suite details on this URL:
15 cipher suites by using the --proxy-ciphers option.
Dtls13-ciphers.d1 Long: tls13-ciphers
8 1.3. The list of ciphers suites must specify valid ciphers. Read up on TLS 1.3
15 cipher suites by using the --ciphers option.
Dproxy-ciphers.d1 Long: proxy-ciphers
3 Help: SSL ciphers to use for proxy
7 Same as --ciphers but used in HTTPS proxy context.
/external/openssh/regress/
Dssh-com.sh90 ciphers="3des-cbc"
94 ciphers="$ciphers cast128-cbc"
98 ciphers="$ciphers aes128-cbc cast128-cbc"
104 for c in $ciphers; do
/external/python/cryptography/tests/hazmat/primitives/
Dtest_ciphers.py14 from cryptography.hazmat.primitives import ciphers
15 from cryptography.hazmat.primitives.ciphers import modes
16 from cryptography.hazmat.primitives.ciphers.algorithms import (
52 ciphers.Cipher(AES(b"0" * 64), mode(b"0" * 16), backend)
65 ciphers.Cipher(AES(b"0" * 16), modes.XTS(b"0" * 16), backend)
195 ciphers.Cipher(AES(b"AAAAAAAAAAAAAAAA"), modes.ECB, pretend_backend)
217 c = ciphers.Cipher(AES(key), modes.ECB(), backend)
235 c = ciphers.Cipher(AES(key), modes.GCM(iv), backend)
242 c = ciphers.Cipher(AES(key), modes.GCM(iv, encryptor.tag), backend)
258 encryptor = ciphers.Cipher(
[all …]
/external/python/cryptography/docs/hazmat/primitives/
Dsymmetric-encryption.rst7 .. module:: cryptography.hazmat.primitives.ciphers
26 :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` with a
28 :class:`~cryptography.hazmat.primitives.ciphers.modes.CBC` or
29 :class:`~cryptography.hazmat.primitives.ciphers.modes.CTR`. A simple
35 >>> from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
48 :class:`~cryptography.hazmat.primitives.ciphers.CipherAlgorithm`
51 :param mode: A :class:`~cryptography.hazmat.primitives.ciphers.modes.Mode`
65 :class:`~cryptography.hazmat.primitives.ciphers.CipherContext`
75 :class:`~cryptography.hazmat.primitives.ciphers.CipherContext`
87 .. currentmodule:: cryptography.hazmat.primitives.ciphers.algorithms
[all …]
Dkeywrap.rst28 :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES`.
46 :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES`.
67 :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES`.
85 :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES`.
/external/conscrypt/benchmark-android/src/main/java/org/conscrypt/
DAndroidEndpointFactory.java26 String[] ciphers) throws IOException { in newClient() argument
28 factories.clientFactory, channelType, port, protocols, ciphers); in newClient()
33 String[] protocols, String[] ciphers) throws IOException { in newServer() argument
35 channelType, messageSize, protocols, ciphers); in newServer()
/external/conscrypt/repackaged/benchmark-android/src/main/java/com/android/org/conscrypt/
DAndroidEndpointFactory.java28 String[] ciphers) throws IOException { in newClient() argument
30 factories.clientFactory, channelType, port, protocols, ciphers); in newClient()
35 String[] protocols, String[] ciphers) throws IOException { in newServer() argument
37 channelType, messageSize, protocols, ciphers); in newServer()
/external/curl/lib/vtls/
Dgskit.c318 } ciphers[CURL_GSKPROTO_LAST]; in set_ciphers() local
333 memset((char *) ciphers, 0, sizeof(ciphers)); in set_ciphers()
335 ciphers[i].buf = malloc(l); in set_ciphers()
336 if(!ciphers[i].buf) { in set_ciphers()
338 free(ciphers[i].buf); in set_ciphers()
341 ciphers[i].ptr = ciphers[i].buf; in set_ciphers()
342 *ciphers[i].ptr = '\0'; in set_ciphers()
367 strcpy(ciphers[i].ptr, ctp->gsktoken); in set_ciphers()
368 ciphers[i].ptr += strlen(ctp->gsktoken); in set_ciphers()
380 if(!(*protoflags & (1 << i)) || !ciphers[i].buf[0]) { in set_ciphers()
[all …]
/external/conscrypt/benchmark-jmh/src/jmh/java/org/conscrypt/
DOpenJdkEndpointFactory.java28 String[] ciphers) throws IOException { in newClient() argument
30 factories.clientFactory, channelType, port, protocols, ciphers); in newClient()
35 String[] protocols, String[] ciphers) throws IOException { in newServer() argument
37 channelType, messageSize, protocols, ciphers); in newServer()
/external/boringssl/src/tool/
Dciphers.cc45 STACK_OF(SSL_CIPHER) *ciphers = SSL_CTX_get_ciphers(ctx.get()); in Ciphers()
48 for (size_t i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in Ciphers()
50 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in Ciphers()
/external/rust/crates/quiche/deps/boringssl/src/tool/
Dciphers.cc45 STACK_OF(SSL_CIPHER) *ciphers = SSL_CTX_get_ciphers(ctx.get()); in Ciphers()
48 for (size_t i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in Ciphers()
50 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in Ciphers()
/external/python/cryptography/src/cryptography/hazmat/backends/openssl/
Dciphers.py9 from cryptography.hazmat.primitives import ciphers
10 from cryptography.hazmat.primitives.ciphers import modes
13 @utils.register_interface(ciphers.CipherContext)
14 @utils.register_interface(ciphers.AEADCipherContext)
15 @utils.register_interface(ciphers.AEADEncryptionContext)
16 @utils.register_interface(ciphers.AEADDecryptionContext)
28 if isinstance(self._cipher, ciphers.BlockCipherAlgorithm):
/external/python/cryptography/docs/development/custom-vectors/arc4/
Dgenerate_arc4.py10 from cryptography.hazmat.primitives import ciphers
11 from cryptography.hazmat.primitives.ciphers import algorithms
65 cipher = ciphers.Cipher(
/external/curl/docs/
DCIPHERS.md6 [`--ciphers`](https://curl.haxx.se/docs/manpage.html#--ciphers)
7 users can control which ciphers to consider when negotiating TLS connections.
9 TLS 1.3 ciphers are supported since curl 7.61 for OpenSSL 1.1.1+ with options
12 [`--tls13-ciphers`](https://curl.haxx.se/docs/manpage.html#--tls13-ciphers)
16 The names of the known ciphers differ depending on which TLS backend that
21 (based on [OpenSSL docs](https://www.openssl.org/docs/man1.1.0/apps/ciphers.html))
159 (Note these ciphers are set with `CURLOPT_TLS13_CIPHERS` and `--tls13-ciphers`)
200 ### AES ciphers
209 ### ECC ciphers
465 protocol or does not match the ciphers offered by the server during the SSL
DSSL-PROBLEMS.md43 Clients give servers a list of ciphers to select from. If the list doesn't
44 include any ciphers the server wants/can use, the connection handshake
48 ciphers from its default set (slightly depending on SSL backend in use).
50 You may have to explicitly provide an alternative list of ciphers for curl
53 Note that these weak ciphers are identified as flawed. For example, this
54 includes symmetric ciphers with less than 128 bit keys and RC4.
/external/conscrypt/benchmark-base/src/main/java/org/conscrypt/
DEndpointFactory.java10 String[] ciphers) throws IOException; in newClient() argument
13 String[] protocols, String[] ciphers) throws IOException; in newServer() argument
DClientSocketBenchmark.java63 ciphers(config)); in ClientSocketBenchmark()
77 config.channelType(), server.port(), config.protocol().getProtocols(), ciphers(config)); in ClientSocketBenchmark()
144 private String[] ciphers(Config config) { in ciphers() method in ClientSocketBenchmark
/external/conscrypt/repackaged/benchmark-base/src/main/java/com/android/org/conscrypt/
DEndpointFactory.java11 String[] ciphers) throws IOException; in newClient() argument
14 String[] protocols, String[] ciphers) throws IOException; in newServer() argument
DClientSocketBenchmark.java65 ciphers(config)); in ClientSocketBenchmark()
79 config.channelType(), server.port(), config.protocol().getProtocols(), ciphers(config)); in ClientSocketBenchmark()
146 private String[] ciphers(Config config) { in ciphers() method in ClientSocketBenchmark
DServerSocketBenchmark.java67 channelType, config.messageSize(), getProtocols(), ciphers(config)); in ServerSocketBenchmark()
91 ChannelType.CHANNEL, server.port(), getProtocols(), ciphers(config)); in ServerSocketBenchmark()
148 private String[] ciphers(Config config) { in ciphers() method in ServerSocketBenchmark
/external/python/cryptography/docs/hazmat/primitives/mac/
Dcmac.rst25 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm` instance.
31 >>> from cryptography.hazmat.primitives.ciphers import algorithms
42 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`
58 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`.
62 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`
/external/python/cryptography/tests/
Ddoubles.py10 from cryptography.hazmat.primitives.ciphers import CipherAlgorithm
11 from cryptography.hazmat.primitives.ciphers.modes import Mode

123456789