/external/curl/docs/cmdline-opts/ |
D | ciphers.d | 1 Long: ciphers 2 Arg: <list of ciphers> 3 help: SSL ciphers to use 6 Specifies which ciphers to use in the connection. The list of ciphers must 7 specify valid ciphers. Read up on SSL cipher list details on this URL: 11 NSS ciphers are done differently than OpenSSL and GnuTLS. The full list of NSS 12 ciphers is in the NSSCipherSuite entry at this URL:
|
/external/openssh/regress/ |
D | ssh-com.sh | 90 ciphers="3des-cbc blowfish-cbc arcfour" 94 ciphers="$ciphers cast128-cbc" 98 ciphers="$ciphers aes128-cbc cast128-cbc" 104 for c in $ciphers; do
|
D | try-ciphers.sh | 30 ciphers="3des blowfish" 32 ciphers="" 34 for c in $ciphers; do
|
D | Makefile | 32 try-ciphers \ 87 INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
|
/external/boringssl/src/tool/ |
D | ciphers.cc | 42 STACK_OF(SSL_CIPHER) *ciphers = pref_list->ciphers; in Ciphers() 45 for (size_t i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in Ciphers() 47 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in Ciphers()
|
D | CMakeLists.txt | 7 ciphers.cc
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 1771 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument 1775 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites() 1779 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites() 1783 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites() 1787 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites() 1791 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites() 1795 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites() 1804 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument 1808 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites() 1812 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites() [all …]
|
D | wpa_common.h | 468 int rsn_cipher_put_suites(u8 *pos, int ciphers); 469 int wpa_cipher_put_suites(u8 *pos, int ciphers); 470 int wpa_pick_pairwise_cipher(int ciphers, int none_allowed); 471 int wpa_pick_group_cipher(int ciphers); 473 int wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim);
|
/external/curl/lib/vtls/ |
D | gskit.c | 310 } ciphers[CURL_GSKPROTO_LAST]; in set_ciphers() local 325 memset((char *) ciphers, 0, sizeof ciphers); in set_ciphers() 327 ciphers[i].buf = malloc(l); in set_ciphers() 328 if(!ciphers[i].buf) { in set_ciphers() 330 free(ciphers[i].buf); in set_ciphers() 333 ciphers[i].ptr = ciphers[i].buf; in set_ciphers() 334 *ciphers[i].ptr = '\0'; in set_ciphers() 359 strcpy(ciphers[i].ptr, ctp->gsktoken); in set_ciphers() 360 ciphers[i].ptr += strlen(ctp->gsktoken); in set_ciphers() 372 if(!(*protoflags & (1 << i)) || !ciphers[i].buf[0]) { in set_ciphers() [all …]
|
/external/conscrypt/benchmark-base/src/main/java/org/conscrypt/ |
D | SocketType.java | 25 String[] ciphers) throws IOException { in newClient() argument 27 factories.clientFactory, channelType, port, protocols, ciphers); in newClient() 31 String[] protocols, String[] ciphers) throws IOException { in newServer() argument 33 channelType, messageSize, protocols, ciphers); in newServer()
|
D | ClientSocketBenchmark.java | 61 ChannelType.CHANNEL, config.messageSize(), getProtocols(), ciphers(config)); in ClientSocketBenchmark() 75 config.channelType(), server.port(), getProtocols(), ciphers(config)); in ClientSocketBenchmark() 120 private String[] ciphers(Config config) { in ciphers() method in ClientSocketBenchmark
|
D | ServerSocketBenchmark.java | 63 channelType, config.messageSize(), getProtocols(), ciphers(config)); in ServerSocketBenchmark() 81 ChannelType.CHANNEL, server.port(), getProtocols(), ciphers(config)); in ServerSocketBenchmark() 134 private String[] ciphers(Config config) { in ciphers() method in ServerSocketBenchmark
|
D | ClientEndpoint.java | 36 String[] protocols, String[] ciphers) throws IOException { in ClientEndpoint() argument 40 socket.setEnabledCipherSuites(ciphers); in ClientEndpoint()
|
/external/webrtc/webrtc/p2p/base/ |
D | transportchannel.cc | 57 bool TransportChannel::SetSrtpCryptoSuites(const std::vector<int>& ciphers) { in SetSrtpCryptoSuites() argument 62 bool TransportChannel::SetSrtpCiphers(const std::vector<std::string>& ciphers) { in SetSrtpCiphers() argument 64 for (const auto cipher : ciphers) { in SetSrtpCiphers()
|
D | dtlstransportchannel.cc | 295 const std::vector<int>& ciphers) { in SetSrtpCryptoSuites() argument 296 if (srtp_ciphers_ == ciphers) in SetSrtpCryptoSuites() 314 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher); in SetSrtpCryptoSuites() 315 if (iter == ciphers.end()) { in SetSrtpCryptoSuites() 317 for (size_t i = 0; i < ciphers.size(); ++i) { in SetSrtpCryptoSuites() 319 requested_str.append(rtc::SrtpCryptoSuiteToName(ciphers[i])); in SetSrtpCryptoSuites() 334 srtp_ciphers_ = ciphers; in SetSrtpCryptoSuites()
|
D | transportchannel.h | 113 virtual bool SetSrtpCryptoSuites(const std::vector<int>& ciphers); 117 virtual bool SetSrtpCiphers(const std::vector<std::string>& ciphers);
|
/external/curl/docs/ |
D | SSL-PROBLEMS.md | 43 Clients give servers a list of ciphers to select from. If the list doesn't 44 include any ciphers the server wants/can use, the connection handshake 48 ciphers from its default set (slightly depending on SSL backend in use). 50 You may have to explicitly provide an alternative list of ciphers for curl 53 Note that these weak ciphers are identified as flawed. For example, this 54 includes symmetric ciphers with less than 128 bit keys and RC4.
|
/external/libnl/python/examples/ |
D | wiphy.py | 83 ciphers = nl.nla_data(attr[nl80211.NL80211_ATTR_CIPHER_SUITES]) 84 num = len(ciphers) / 4 88 print("\t\t* %s" % cipher_name(ciphers[i:i+4]))
|
/external/python/cpython2/Lib/ |
D | ssl.py | 534 suppress_ragged_eofs=True, npn_protocols=None, ciphers=None, argument 557 if ciphers: 558 self._context.set_ciphers(ciphers) 564 self.ciphers = ciphers 936 ciphers=None): argument 943 ciphers=ciphers)
|
/external/openssh/ |
D | cipher.c | 89 static const struct sshcipher ciphers[] = { variable 153 for (c = ciphers; c->name != NULL; c++) { in cipher_alg_list() 249 for (c = ciphers; c->name != NULL; c++) in cipher_by_name() 259 for (c = ciphers; c->name != NULL; c++) in cipher_by_number() 300 for (c = ciphers; c->name != NULL; c++) in cipher_number()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ie.c | 504 int ciphers, key_mgmt, res, version; in wpa_validate_wpa_ie() local 666 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; in wpa_validate_wpa_ie() 668 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; in wpa_validate_wpa_ie() 669 if (!ciphers) { in wpa_validate_wpa_ie() 685 if (ciphers & WPA_CIPHER_TKIP) { in wpa_validate_wpa_ie() 726 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie()
|
/external/python/cpython2/Lib/test/ |
D | ssl_servers.py | 203 if args.ciphers: 204 context.set_ciphers(args.ciphers)
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_fast.c | 1446 u8 ciphers[7]; in eap_fast_set_provisioning_ciphers() local 1452 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1458 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES256_SHA; in eap_fast_set_provisioning_ciphers() 1459 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1460 ciphers[count++] = TLS_CIPHER_AES256_SHA; in eap_fast_set_provisioning_ciphers() 1461 ciphers[count++] = TLS_CIPHER_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1462 ciphers[count++] = TLS_CIPHER_RC4_SHA; in eap_fast_set_provisioning_ciphers() 1465 ciphers[count++] = TLS_CIPHER_NONE; in eap_fast_set_provisioning_ciphers() 1468 ciphers)) { in eap_fast_set_provisioning_ciphers()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_server.h | 37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
|
/external/libvncserver/webclients/java-applet/ssl/ |
D | ss_vncviewer | 212 ciphers="" 276 "-anondh") ciphers="ciphers=$anondh" 281 "-ciphers") shift; ciphers="ciphers=$1" 3153 if [ "X$ciphers" != "X" ]; then 3154 cipher_args=`echo "$ciphers" | sed -e 's/ciphers=/-cipher /'` 3455 $ciphers 3507 $ciphers
|