/external/curl/docs/cmdline-opts/ |
ciphers.d | 1 Long: ciphers 2 Arg: <list of ciphers> 3 help: SSL ciphers to use 6 Specifies which ciphers to use in the connection. The list of ciphers must 7 specify valid ciphers. Read up on SSL cipher list details on this URL: 9 https://www.openssl.org/docs/apps/ciphers.html 11 NSS ciphers are done differently than OpenSSL and GnuTLS. The full list of NSS 12 ciphers is in the NSSCipherSuite entry at this URL:
|
/external/boringssl/src/tool/ |
ciphers.cc | 26 bool Ciphers(const std::vector<std::string> &args) { 28 fprintf(stderr, "Usage: bssl ciphers <cipher suite string>\n"); 42 STACK_OF(SSL_CIPHER) *ciphers = pref_list->ciphers; 45 for (size_t i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { 47 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i);
|
/external/webrtc/webrtc/p2p/base/ |
transportchannel.cc | 57 bool TransportChannel::SetSrtpCryptoSuites(const std::vector<int>& ciphers) { 62 bool TransportChannel::SetSrtpCiphers(const std::vector<std::string>& ciphers) { 64 for (const auto cipher : ciphers) {
|
dtlstransportchannel.cc | 283 LOG_J(LS_ERROR, this) << "Couldn't set DTLS-SRTP ciphers."; 295 const std::vector<int>& ciphers) { 296 if (srtp_ciphers_ == ciphers) 300 LOG(LS_WARNING) << "Ignoring new SRTP ciphers while DTLS is negotiating"; 305 // We don't support DTLS renegotiation currently. If new set of srtp ciphers 314 std::find(ciphers.begin(), ciphers.end(), current_srtp_cipher); 315 if (iter == ciphers.end()) { 317 for (size_t i = 0; i < ciphers.size(); ++i) { 319 requested_str.append(rtc::SrtpCryptoSuiteToName(ciphers[i])) [all...] |
transportchannel.h | 111 // Sets up the ciphers to use for DTLS-SRTP. TODO(guoweis): Make this pure 113 virtual bool SetSrtpCryptoSuites(const std::vector<int>& ciphers); 117 virtual bool SetSrtpCiphers(const std::vector<std::string>& ciphers);
|
/external/openssh/regress/ |
try-ciphers.sh | 1 # $OpenBSD: try-ciphers.sh,v 1.25 2015/03/24 20:22:17 markus Exp $ 4 tid="try ciphers" 14 echo "Ciphers=$c" >> $OBJ/sshd_proxy 20 # No point trying all MACs for AEAD ciphers since they 30 ciphers="3des blowfish" 32 ciphers="" 34 for c in $ciphers; do
|
cipher-speed.sh | 27 # No point trying all MACs for AEAD ciphers since they are ignored. 35 ciphers="3des blowfish" 37 ciphers="" 39 for c in $ciphers; do
|
ssh-com.sh | 40 Ciphers AnyCipher 90 ciphers="3des-cbc blowfish-cbc arcfour" 94 ciphers="$ciphers cast128-cbc" 98 ciphers="$ciphers aes128-cbc cast128-cbc" 102 #ciphers="3des-cbc" 104 for c in $ciphers; do
|
/external/conscrypt/benchmark-base/src/main/java/org/conscrypt/ |
SocketType.java | 25 String[] ciphers) throws IOException { 27 factories.clientFactory, channelType, port, protocols, ciphers); 31 String[] protocols, String[] ciphers) throws IOException { 33 channelType, messageSize, protocols, ciphers);
|
ClientEndpoint.java | 36 String[] protocols, String[] ciphers) throws IOException { 40 socket.setEnabledCipherSuites(ciphers);
|
ClientSocketBenchmark.java | 61 ChannelType.CHANNEL, config.messageSize(), getProtocols(), ciphers(config)); 75 config.channelType(), server.port(), getProtocols(), ciphers(config)); 120 private String[] ciphers(Config config) { method in class:ClientSocketBenchmark
|
ServerSocketBenchmark.java | 63 channelType, config.messageSize(), getProtocols(), ciphers(config)); 81 ChannelType.CHANNEL, server.port(), getProtocols(), ciphers(config)); 134 private String[] ciphers(Config config) { method in class:ServerSocketBenchmark
|
/prebuilts/go/darwin-x86/src/crypto/internal/cipherhw/ |
doc.go | 6 // support for certain ciphers and authenticators is present.
|
/prebuilts/go/linux-x86/src/crypto/internal/cipherhw/ |
doc.go | 6 // support for certain ciphers and authenticators is present.
|
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
ssl.py | 95 # Disable weak or insecure ciphers by default 110 suppress_ragged_eofs=True, ciphers=None): 121 if ciphers is None and ssl_version != _SSLv2_IF_EXISTS: 122 ciphers = _DEFAULT_CIPHERS 141 ciphers) 149 self.ciphers = ciphers 314 self.ca_certs, self.ciphers) 355 ciphers=self.ciphers, [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/ |
ssl.py | 95 # Disable weak or insecure ciphers by default 110 suppress_ragged_eofs=True, ciphers=None): 121 if ciphers is None and ssl_version != _SSLv2_IF_EXISTS: 122 ciphers = _DEFAULT_CIPHERS 141 ciphers) 149 self.ciphers = ciphers 314 self.ca_certs, self.ciphers) 355 ciphers=self.ciphers, [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
ssl.py | 95 # Disable weak or insecure ciphers by default 110 suppress_ragged_eofs=True, ciphers=None): 121 if ciphers is None and ssl_version != _SSLv2_IF_EXISTS: 122 ciphers = _DEFAULT_CIPHERS 141 ciphers) 149 self.ciphers = ciphers 314 self.ca_certs, self.ciphers) 355 ciphers=self.ciphers, [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
ssl.py | 95 # Disable weak or insecure ciphers by default 110 suppress_ragged_eofs=True, ciphers=None): 121 if ciphers is None and ssl_version != _SSLv2_IF_EXISTS: 122 ciphers = _DEFAULT_CIPHERS 141 ciphers) 149 self.ciphers = ciphers 314 self.ca_certs, self.ciphers) 355 ciphers=self.ciphers, [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
ssl.py | 104 suppress_ragged_eofs=True, ciphers=None):
132 ciphers)
140 self.ciphers = ciphers
305 self.ca_certs, self.ciphers)
343 ciphers=self.ciphers,
365 suppress_ragged_eofs=True, ciphers=None):
372 ciphers=ciphers)
[all...] |
/external/curl/lib/vtls/ |
gskit.c | 102 /* Supported ciphers. */ 310 } ciphers[CURL_GSKPROTO_LAST]; local 325 memset((char *) ciphers, 0, sizeof ciphers); 327 ciphers[i].buf = malloc(l); 328 if(!ciphers[i].buf) { 330 free(ciphers[i].buf); 333 ciphers[i].ptr = ciphers[i].buf; 334 *ciphers[i].ptr = '\0' [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server.h | 37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
|
tlsv1_client.h | 41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
|
/external/libnl/python/examples/ |
wiphy.py | 83 ciphers = nl.nla_data(attr[nl80211.NL80211_ATTR_CIPHER_SUITES]) 84 num = len(ciphers) / 4 86 print("\tSupported Ciphers:"); 88 print("\t\t* %s" % cipher_name(ciphers[i:i+4]))
|
/prebuilts/tools/common/m2/repository/io/netty/netty-handler/4.1.6.Final/ |
netty-handler-4.1.6.Final.jar | |