Home
last modified time | relevance | path

Searched refs:ciphers (Results 1 – 25 of 86) sorted by relevance

1234

/external/curl/docs/cmdline-opts/
Dciphers.d1 Long: ciphers
2 Arg: <list of ciphers>
3 help: SSL ciphers to use
6 Specifies which ciphers to use in the connection. The list of ciphers must
7 specify valid ciphers. Read up on SSL cipher list details on this URL:
11 NSS ciphers are done differently than OpenSSL and GnuTLS. The full list of NSS
12 ciphers is in the NSSCipherSuite entry at this URL:
/external/openssh/regress/
Dssh-com.sh90 ciphers="3des-cbc blowfish-cbc arcfour"
94 ciphers="$ciphers cast128-cbc"
98 ciphers="$ciphers aes128-cbc cast128-cbc"
104 for c in $ciphers; do
Dtry-ciphers.sh30 ciphers="3des blowfish"
32 ciphers=""
34 for c in $ciphers; do
DMakefile32 try-ciphers \
87 INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
/external/boringssl/src/tool/
Dciphers.cc42 STACK_OF(SSL_CIPHER) *ciphers = pref_list->ciphers; in Ciphers()
45 for (size_t i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in Ciphers()
47 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in Ciphers()
DCMakeLists.txt7 ciphers.cc
/external/wpa_supplicant_8/src/common/
Dwpa_common.c1771 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument
1775 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites()
1779 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites()
1783 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites()
1787 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites()
1791 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites()
1795 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites()
1804 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument
1808 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites()
1812 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites()
[all …]
Dwpa_common.h468 int rsn_cipher_put_suites(u8 *pos, int ciphers);
469 int wpa_cipher_put_suites(u8 *pos, int ciphers);
470 int wpa_pick_pairwise_cipher(int ciphers, int none_allowed);
471 int wpa_pick_group_cipher(int ciphers);
473 int wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim);
/external/curl/lib/vtls/
Dgskit.c310 } ciphers[CURL_GSKPROTO_LAST]; in set_ciphers() local
325 memset((char *) ciphers, 0, sizeof ciphers); in set_ciphers()
327 ciphers[i].buf = malloc(l); in set_ciphers()
328 if(!ciphers[i].buf) { in set_ciphers()
330 free(ciphers[i].buf); in set_ciphers()
333 ciphers[i].ptr = ciphers[i].buf; in set_ciphers()
334 *ciphers[i].ptr = '\0'; in set_ciphers()
359 strcpy(ciphers[i].ptr, ctp->gsktoken); in set_ciphers()
360 ciphers[i].ptr += strlen(ctp->gsktoken); in set_ciphers()
372 if(!(*protoflags & (1 << i)) || !ciphers[i].buf[0]) { in set_ciphers()
[all …]
/external/conscrypt/benchmark-base/src/main/java/org/conscrypt/
DSocketType.java25 String[] ciphers) throws IOException { in newClient() argument
27 factories.clientFactory, channelType, port, protocols, ciphers); in newClient()
31 String[] protocols, String[] ciphers) throws IOException { in newServer() argument
33 channelType, messageSize, protocols, ciphers); in newServer()
DClientSocketBenchmark.java61 ChannelType.CHANNEL, config.messageSize(), getProtocols(), ciphers(config)); in ClientSocketBenchmark()
75 config.channelType(), server.port(), getProtocols(), ciphers(config)); in ClientSocketBenchmark()
120 private String[] ciphers(Config config) { in ciphers() method in ClientSocketBenchmark
DServerSocketBenchmark.java63 channelType, config.messageSize(), getProtocols(), ciphers(config)); in ServerSocketBenchmark()
81 ChannelType.CHANNEL, server.port(), getProtocols(), ciphers(config)); in ServerSocketBenchmark()
134 private String[] ciphers(Config config) { in ciphers() method in ServerSocketBenchmark
DClientEndpoint.java36 String[] protocols, String[] ciphers) throws IOException { in ClientEndpoint() argument
40 socket.setEnabledCipherSuites(ciphers); in ClientEndpoint()
/external/webrtc/webrtc/p2p/base/
Dtransportchannel.cc57 bool TransportChannel::SetSrtpCryptoSuites(const std::vector<int>& ciphers) { in SetSrtpCryptoSuites() argument
62 bool TransportChannel::SetSrtpCiphers(const std::vector<std::string>& ciphers) { in SetSrtpCiphers() argument
64 for (const auto cipher : ciphers) { in SetSrtpCiphers()
Ddtlstransportchannel.cc295 const std::vector<int>& ciphers) { in SetSrtpCryptoSuites() argument
296 if (srtp_ciphers_ == ciphers) in SetSrtpCryptoSuites()
314 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher); in SetSrtpCryptoSuites()
315 if (iter == ciphers.end()) { in SetSrtpCryptoSuites()
317 for (size_t i = 0; i < ciphers.size(); ++i) { in SetSrtpCryptoSuites()
319 requested_str.append(rtc::SrtpCryptoSuiteToName(ciphers[i])); in SetSrtpCryptoSuites()
334 srtp_ciphers_ = ciphers; in SetSrtpCryptoSuites()
Dtransportchannel.h113 virtual bool SetSrtpCryptoSuites(const std::vector<int>& ciphers);
117 virtual bool SetSrtpCiphers(const std::vector<std::string>& ciphers);
/external/curl/docs/
DSSL-PROBLEMS.md43 Clients give servers a list of ciphers to select from. If the list doesn't
44 include any ciphers the server wants/can use, the connection handshake
48 ciphers from its default set (slightly depending on SSL backend in use).
50 You may have to explicitly provide an alternative list of ciphers for curl
53 Note that these weak ciphers are identified as flawed. For example, this
54 includes symmetric ciphers with less than 128 bit keys and RC4.
/external/libnl/python/examples/
Dwiphy.py83 ciphers = nl.nla_data(attr[nl80211.NL80211_ATTR_CIPHER_SUITES])
84 num = len(ciphers) / 4
88 print("\t\t* %s" % cipher_name(ciphers[i:i+4]))
/external/python/cpython2/Lib/
Dssl.py534 suppress_ragged_eofs=True, npn_protocols=None, ciphers=None, argument
557 if ciphers:
558 self._context.set_ciphers(ciphers)
564 self.ciphers = ciphers
936 ciphers=None): argument
943 ciphers=ciphers)
/external/openssh/
Dcipher.c89 static const struct sshcipher ciphers[] = { variable
153 for (c = ciphers; c->name != NULL; c++) { in cipher_alg_list()
249 for (c = ciphers; c->name != NULL; c++) in cipher_by_name()
259 for (c = ciphers; c->name != NULL; c++) in cipher_by_number()
300 for (c = ciphers; c->name != NULL; c++) in cipher_number()
/external/wpa_supplicant_8/src/ap/
Dwpa_auth_ie.c504 int ciphers, key_mgmt, res, version; in wpa_validate_wpa_ie() local
666 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; in wpa_validate_wpa_ie()
668 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; in wpa_validate_wpa_ie()
669 if (!ciphers) { in wpa_validate_wpa_ie()
685 if (ciphers & WPA_CIPHER_TKIP) { in wpa_validate_wpa_ie()
726 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie()
/external/python/cpython2/Lib/test/
Dssl_servers.py203 if args.ciphers:
204 context.set_ciphers(args.ciphers)
/external/wpa_supplicant_8/src/eap_peer/
Deap_fast.c1446 u8 ciphers[7]; in eap_fast_set_provisioning_ciphers() local
1452 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA; in eap_fast_set_provisioning_ciphers()
1458 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES256_SHA; in eap_fast_set_provisioning_ciphers()
1459 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA; in eap_fast_set_provisioning_ciphers()
1460 ciphers[count++] = TLS_CIPHER_AES256_SHA; in eap_fast_set_provisioning_ciphers()
1461 ciphers[count++] = TLS_CIPHER_AES128_SHA; in eap_fast_set_provisioning_ciphers()
1462 ciphers[count++] = TLS_CIPHER_RC4_SHA; in eap_fast_set_provisioning_ciphers()
1465 ciphers[count++] = TLS_CIPHER_NONE; in eap_fast_set_provisioning_ciphers()
1468 ciphers)) { in eap_fast_set_provisioning_ciphers()
/external/wpa_supplicant_8/src/tls/
Dtlsv1_server.h37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
/external/libvncserver/webclients/java-applet/ssl/
Dss_vncviewer212 ciphers=""
276 "-anondh") ciphers="ciphers=$anondh"
281 "-ciphers") shift; ciphers="ciphers=$1"
3153 if [ "X$ciphers" != "X" ]; then
3154 cipher_args=`echo "$ciphers" | sed -e 's/ciphers=/-cipher /'`
3455 $ciphers
3507 $ciphers

1234