/external/curl/docs/cmdline-opts/ |
D | ciphers.d | 1 Long: ciphers 2 Arg: <list of ciphers> 3 Help: SSL ciphers to use 7 Specifies which ciphers to use in the connection. The list of ciphers must 8 specify valid ciphers. Read up on SSL cipher list details on this URL:
|
D | proxy-tls13-ciphers.d | 1 Long: proxy-tls13-ciphers 8 when it negotiates TLS 1.3. The list of ciphers suites must specify valid 9 ciphers. Read up on TLS 1.3 cipher suite details on this URL: 15 cipher suites by using the --proxy-ciphers option.
|
D | tls13-ciphers.d | 1 Long: tls13-ciphers 8 1.3. The list of ciphers suites must specify valid ciphers. Read up on TLS 1.3 15 cipher suites by using the --ciphers option.
|
D | proxy-ciphers.d | 1 Long: proxy-ciphers 3 Help: SSL ciphers to use for proxy 7 Same as --ciphers but used in HTTPS proxy context.
|
/external/openssh/regress/ |
D | ssh-com.sh | 90 ciphers="3des-cbc" 94 ciphers="$ciphers cast128-cbc" 98 ciphers="$ciphers aes128-cbc cast128-cbc" 104 for c in $ciphers; do
|
/external/python/cryptography/tests/hazmat/primitives/ |
D | test_ciphers.py | 14 from cryptography.hazmat.primitives import ciphers 15 from cryptography.hazmat.primitives.ciphers import modes 16 from cryptography.hazmat.primitives.ciphers.algorithms import ( 52 ciphers.Cipher(AES(b"0" * 64), mode(b"0" * 16), backend) 65 ciphers.Cipher(AES(b"0" * 16), modes.XTS(b"0" * 16), backend) 195 ciphers.Cipher(AES(b"AAAAAAAAAAAAAAAA"), modes.ECB, pretend_backend) 217 c = ciphers.Cipher(AES(key), modes.ECB(), backend) 235 c = ciphers.Cipher(AES(key), modes.GCM(iv), backend) 242 c = ciphers.Cipher(AES(key), modes.GCM(iv, encryptor.tag), backend) 258 encryptor = ciphers.Cipher( [all …]
|
/external/python/cryptography/docs/hazmat/primitives/ |
D | symmetric-encryption.rst | 7 .. module:: cryptography.hazmat.primitives.ciphers 26 :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` with a 28 :class:`~cryptography.hazmat.primitives.ciphers.modes.CBC` or 29 :class:`~cryptography.hazmat.primitives.ciphers.modes.CTR`. A simple 35 >>> from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes 48 :class:`~cryptography.hazmat.primitives.ciphers.CipherAlgorithm` 51 :param mode: A :class:`~cryptography.hazmat.primitives.ciphers.modes.Mode` 65 :class:`~cryptography.hazmat.primitives.ciphers.CipherContext` 75 :class:`~cryptography.hazmat.primitives.ciphers.CipherContext` 87 .. currentmodule:: cryptography.hazmat.primitives.ciphers.algorithms [all …]
|
D | keywrap.rst | 28 :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES`. 46 :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES`. 67 :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES`. 85 :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES`.
|
/external/conscrypt/benchmark-android/src/main/java/org/conscrypt/ |
D | AndroidEndpointFactory.java | 26 String[] ciphers) throws IOException { in newClient() argument 28 factories.clientFactory, channelType, port, protocols, ciphers); in newClient() 33 String[] protocols, String[] ciphers) throws IOException { in newServer() argument 35 channelType, messageSize, protocols, ciphers); in newServer()
|
/external/conscrypt/repackaged/benchmark-android/src/main/java/com/android/org/conscrypt/ |
D | AndroidEndpointFactory.java | 28 String[] ciphers) throws IOException { in newClient() argument 30 factories.clientFactory, channelType, port, protocols, ciphers); in newClient() 35 String[] protocols, String[] ciphers) throws IOException { in newServer() argument 37 channelType, messageSize, protocols, ciphers); in newServer()
|
/external/curl/lib/vtls/ |
D | gskit.c | 318 } ciphers[CURL_GSKPROTO_LAST]; in set_ciphers() local 333 memset((char *) ciphers, 0, sizeof(ciphers)); in set_ciphers() 335 ciphers[i].buf = malloc(l); in set_ciphers() 336 if(!ciphers[i].buf) { in set_ciphers() 338 free(ciphers[i].buf); in set_ciphers() 341 ciphers[i].ptr = ciphers[i].buf; in set_ciphers() 342 *ciphers[i].ptr = '\0'; in set_ciphers() 367 strcpy(ciphers[i].ptr, ctp->gsktoken); in set_ciphers() 368 ciphers[i].ptr += strlen(ctp->gsktoken); in set_ciphers() 380 if(!(*protoflags & (1 << i)) || !ciphers[i].buf[0]) { in set_ciphers() [all …]
|
/external/conscrypt/benchmark-jmh/src/jmh/java/org/conscrypt/ |
D | OpenJdkEndpointFactory.java | 28 String[] ciphers) throws IOException { in newClient() argument 30 factories.clientFactory, channelType, port, protocols, ciphers); in newClient() 35 String[] protocols, String[] ciphers) throws IOException { in newServer() argument 37 channelType, messageSize, protocols, ciphers); in newServer()
|
/external/boringssl/src/tool/ |
D | ciphers.cc | 45 STACK_OF(SSL_CIPHER) *ciphers = SSL_CTX_get_ciphers(ctx.get()); in Ciphers() 48 for (size_t i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in Ciphers() 50 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in Ciphers()
|
/external/rust/crates/quiche/deps/boringssl/src/tool/ |
D | ciphers.cc | 45 STACK_OF(SSL_CIPHER) *ciphers = SSL_CTX_get_ciphers(ctx.get()); in Ciphers() 48 for (size_t i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in Ciphers() 50 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in Ciphers()
|
/external/python/cryptography/src/cryptography/hazmat/backends/openssl/ |
D | ciphers.py | 9 from cryptography.hazmat.primitives import ciphers 10 from cryptography.hazmat.primitives.ciphers import modes 13 @utils.register_interface(ciphers.CipherContext) 14 @utils.register_interface(ciphers.AEADCipherContext) 15 @utils.register_interface(ciphers.AEADEncryptionContext) 16 @utils.register_interface(ciphers.AEADDecryptionContext) 28 if isinstance(self._cipher, ciphers.BlockCipherAlgorithm):
|
/external/python/cryptography/docs/development/custom-vectors/arc4/ |
D | generate_arc4.py | 10 from cryptography.hazmat.primitives import ciphers 11 from cryptography.hazmat.primitives.ciphers import algorithms 65 cipher = ciphers.Cipher(
|
/external/curl/docs/ |
D | CIPHERS.md | 6 [`--ciphers`](https://curl.haxx.se/docs/manpage.html#--ciphers) 7 users can control which ciphers to consider when negotiating TLS connections. 9 TLS 1.3 ciphers are supported since curl 7.61 for OpenSSL 1.1.1+ with options 12 [`--tls13-ciphers`](https://curl.haxx.se/docs/manpage.html#--tls13-ciphers) 16 The names of the known ciphers differ depending on which TLS backend that 21 (based on [OpenSSL docs](https://www.openssl.org/docs/man1.1.0/apps/ciphers.html)) 159 (Note these ciphers are set with `CURLOPT_TLS13_CIPHERS` and `--tls13-ciphers`) 200 ### AES ciphers 209 ### ECC ciphers 465 protocol or does not match the ciphers offered by the server during the SSL
|
D | SSL-PROBLEMS.md | 43 Clients give servers a list of ciphers to select from. If the list doesn't 44 include any ciphers the server wants/can use, the connection handshake 48 ciphers from its default set (slightly depending on SSL backend in use). 50 You may have to explicitly provide an alternative list of ciphers for curl 53 Note that these weak ciphers are identified as flawed. For example, this 54 includes symmetric ciphers with less than 128 bit keys and RC4.
|
/external/conscrypt/benchmark-base/src/main/java/org/conscrypt/ |
D | EndpointFactory.java | 10 String[] ciphers) throws IOException; in newClient() argument 13 String[] protocols, String[] ciphers) throws IOException; in newServer() argument
|
D | ClientSocketBenchmark.java | 63 ciphers(config)); in ClientSocketBenchmark() 77 config.channelType(), server.port(), config.protocol().getProtocols(), ciphers(config)); in ClientSocketBenchmark() 144 private String[] ciphers(Config config) { in ciphers() method in ClientSocketBenchmark
|
/external/conscrypt/repackaged/benchmark-base/src/main/java/com/android/org/conscrypt/ |
D | EndpointFactory.java | 11 String[] ciphers) throws IOException; in newClient() argument 14 String[] protocols, String[] ciphers) throws IOException; in newServer() argument
|
D | ClientSocketBenchmark.java | 65 ciphers(config)); in ClientSocketBenchmark() 79 config.channelType(), server.port(), config.protocol().getProtocols(), ciphers(config)); in ClientSocketBenchmark() 146 private String[] ciphers(Config config) { in ciphers() method in ClientSocketBenchmark
|
D | ServerSocketBenchmark.java | 67 channelType, config.messageSize(), getProtocols(), ciphers(config)); in ServerSocketBenchmark() 91 ChannelType.CHANNEL, server.port(), getProtocols(), ciphers(config)); in ServerSocketBenchmark() 148 private String[] ciphers(Config config) { in ciphers() method in ServerSocketBenchmark
|
/external/python/cryptography/docs/hazmat/primitives/mac/ |
D | cmac.rst | 25 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm` instance. 31 >>> from cryptography.hazmat.primitives.ciphers import algorithms 42 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm` 58 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`. 62 :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`
|
/external/python/cryptography/tests/ |
D | doubles.py | 10 from cryptography.hazmat.primitives.ciphers import CipherAlgorithm 11 from cryptography.hazmat.primitives.ciphers.modes import Mode
|