Home
last modified time | relevance | path

Searched refs:ciphers (Results 1 – 25 of 248) sorted by relevance

12345678910

/third_party/openssl/test/
Dgosttest.c23 } ciphers[] = { variable
46 ciphers[idx].certnum == 0 ? cert1 in test_tls13()
48 ciphers[idx].certnum == 0 ? privkey1 in test_tls13()
52 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, ciphers[idx].cipher)) in test_tls13()
53 || !TEST_true(SSL_CTX_set_cipher_list(sctx, ciphers[idx].cipher)) in test_tls13()
58 if (ciphers[idx].expected_prot == 0) { in test_tls13()
66 ciphers[idx].expected_prot)) in test_tls13()
89 ADD_ALL_TESTS(test_tls13, OSSL_NELEM(ciphers)); in setup_tests()
Dcipherlist_test.c150 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist()
159 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist()
163 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist()
169 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist()
179 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist()
Ddtls_mtu_test.c147 STACK_OF(SSL_CIPHER) *ciphers; in run_mtu_tests()
165 ciphers = SSL_CTX_get_ciphers(ctx); in run_mtu_tests()
166 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in run_mtu_tests()
167 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in run_mtu_tests()
/third_party/curl/docs/cmdline-opts/
Dciphers.d1 Long: ciphers
2 Arg: <list of ciphers>
3 Help: SSL ciphers to use
7 Specifies which ciphers to use in the connection. The list of ciphers must
8 specify valid ciphers. Read up on SSL cipher list details on this URL:
Dtls13-ciphers.d1 Long: tls13-ciphers
8 1.3. The list of ciphers suites must specify valid ciphers. Read up on TLS 1.3
15 cipher suites by using the --ciphers option.
Dproxy-tls13-ciphers.d1 Long: proxy-tls13-ciphers
8 when it negotiates TLS 1.3. The list of ciphers suites must specify valid
9 ciphers. Read up on TLS 1.3 cipher suite details on this URL:
15 cipher suites by using the --proxy-ciphers option.
Dproxy-ciphers.d1 Long: proxy-ciphers
3 Help: SSL ciphers to use for proxy
7 Same as --ciphers but used in HTTPS proxy context.
/third_party/node/test/parallel/
Dtest-tls-multi-pfx.js20 const ciphers = []; variable
26 ciphers: 'ECDHE-ECDSA-AES256-GCM-SHA384', property
29 ciphers.push(ecdsa.getCipher());
31 ciphers: 'ECDHE-RSA-AES256-GCM-SHA384', property
34 ciphers.push(rsa.getCipher());
43 assert.deepStrictEqual(ciphers, [{
Dtest-tls-client-default-ciphers.js33 let ciphers = '';
36 ciphers = options.ciphers;
42 assert.strictEqual(ciphers, tls.DEFAULT_CIPHERS);
Dtest-tls-dhe.js40 const ciphers = 'DHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256'; constant
55 ciphers: ciphers, property
70 '-cipher', ciphers];
Dtest-tls-getcipher.js50 ciphers: 'AES128-SHA256', property
64 ciphers: 'ECDHE-RSA-AES128-GCM-SHA256', property
79 ciphers: 'TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_CCM_8_SHA256', property
86 ciphers: 'TLS_AES_128_CCM_8_SHA256', property
Dtest-tls-set-ciphers-error.js15 ciphers: 'aes256-sha' property
19 options.ciphers = 'FOOBARBAZ';
22 options.ciphers = 'TLS_not_a_cipher';
/third_party/openssl/doc/man3/
DSSL_CTX_set_cipher_list.pod23 SSL_CTX_set_cipher_list() sets the list of available ciphers (TLSv1.2 and below)
25 in L<ciphers(1)>. The list of ciphers is inherited by all
29 SSL_set_cipher_list() sets the list of ciphers (TLSv1.2 and below) only for
61 on details of the library configuration (ciphers compiled in). Thus no
63 corresponding ciphers are not compiled in or because they are mistyped,
64 are simply ignored. Failure is only flagged if no ciphers could be collected
70 additional restrictions apply. All ciphers have additional requirements.
71 ADH ciphers don't need a certificate, but DH-parameters must have been set.
72 All other ciphers need a corresponding certificate and key.
75 RSA ciphers using DHE need a certificate and key and additional DH-parameters
[all …]
DSSL_get_ciphers.pod31 sorted by preference. If B<ssl> is NULL or no ciphers are available, NULL
40 SRP and PSK ciphers are only enabled if the appropriate callbacks or settings
42 The list of ciphers that would be sent in a ClientHello can differ from
43 the list of ciphers that would be acceptable when acting as a server.
44 For example, additional ciphers may be usable by a server if there is
45 a gap in the list of supported protocols, and some ciphers may not be
47 If B<ssl> is NULL or no ciphers are available, NULL is returned.
50 list received from the client on B<ssl>. If B<ssl> is NULL, no ciphers are
62 listed for B<ssl> with B<priority>. If B<ssl> is NULL, no ciphers are
63 available, or there are less ciphers than B<priority> available, NULL
[all …]
DOpenSSL_add_all_algorithms.pod24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses
25 this table to lookup ciphers via functions such as EVP_get_cipher_byname().
30 ciphers).
35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
/third_party/openssl/crypto/engine/
Dtb_cipher.c26 if (e->ciphers) { in ENGINE_register_ciphers()
28 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers()
47 if (e->ciphers) { in ENGINE_set_default_ciphers()
49 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers()
83 return e->ciphers; in ENGINE_get_ciphers()
89 e->ciphers = f; in ENGINE_set_ciphers()
/third_party/openssl/test/recipes/
D20-test_enc_more.t30 my @ciphers =
36 plan tests => 2 + scalar @ciphers;
39 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
43 skip "Not initialized, skipping...", scalar(@ciphers);
46 foreach my $cipher (@ciphers) {
D20-test_enc.t31 my @ciphers =
36 plan tests => 2 + (scalar @ciphers)*2;
39 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
43 skip "Not initialized, skipping...", scalar(@ciphers);
46 foreach my $c (@ciphers) {
D70-test_sslsigalgs.t130 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
146 $proxy->ciphers("ECDHE-RSA-AES128-SHA\@SECLEVEL=1");
156 $proxy->ciphers("DEFAULT\@SECLEVEL=2");
166 $proxy->ciphers("DEFAULT\@SECLEVEL=1");
174 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
182 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
191 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
199 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
210 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
218 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
[all …]
/third_party/openssl/doc/man1/
Dciphers.pod5 openssl-ciphers,
6 ciphers - SSL cipher display and cipher list tool
10 B<openssl> B<ciphers>
30 The B<ciphers> command converts textual OpenSSL cipher lists into ordered
44 Only list supported ciphers: those consistent with the security level, and
48 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp>
53 On a server the list of supported ciphers might also exclude other ciphers
56 If this option is not used then all ciphers that match the cipherlist will be
78 In combination with the B<-s> option, list the ciphers which could be used if
119 cipher suites of a certain type. For example B<SHA1> represents all ciphers
[all …]
/third_party/nghttp2/
Dmkcipherlist.py295 ciphers = [] variable
306 ciphers.append((id, name))
311 for id, name in ciphers:
318 for id, name in ciphers:
/third_party/node/lib/
D_tls_common.js197 if (options.ciphers && typeof options.ciphers !== 'string') {
199 'options.ciphers', 'string', options.ciphers);
206 const ciphers = (options.ciphers || tls.DEFAULT_CIPHERS).split(':');
207 const cipherList = ciphers.filter((_) => !_.match(/^TLS_/) &&
209 const cipherSuites = ciphers.filter((_) => _.match(/^TLS_/)).join(':');
214 throw new ERR_INVALID_OPT_VALUE('ciphers', ciphers);
/third_party/curl/lib/vtls/
Dgskit.c320 } ciphers[CURL_GSKPROTO_LAST]; in set_ciphers() local
335 memset((char *) ciphers, 0, sizeof(ciphers)); in set_ciphers()
337 ciphers[i].buf = malloc(l); in set_ciphers()
338 if(!ciphers[i].buf) { in set_ciphers()
340 free(ciphers[i].buf); in set_ciphers()
343 ciphers[i].ptr = ciphers[i].buf; in set_ciphers()
344 *ciphers[i].ptr = '\0'; in set_ciphers()
369 strcpy(ciphers[i].ptr, ctp->gsktoken); in set_ciphers()
370 ciphers[i].ptr += strlen(ctp->gsktoken); in set_ciphers()
382 if(!(*protoflags & (1 << i)) || !ciphers[i].buf[0]) { in set_ciphers()
[all …]
/third_party/curl/docs/
DCIPHERS.md6 [`--ciphers`](https://curl.se/docs/manpage.html#--ciphers)
7 users can control which ciphers to consider when negotiating TLS connections.
9 TLS 1.3 ciphers are supported since curl 7.61 for OpenSSL 1.1.1+ with options
12 [`--tls13-ciphers`](https://curl.se/docs/manpage.html#--tls13-ciphers)
16 The names of the known ciphers differ depending on which TLS backend that
21 (based on [OpenSSL docs](https://www.openssl.org/docs/man1.1.0/apps/ciphers.html))
159 (Note these ciphers are set with `CURLOPT_TLS13_CIPHERS` and `--tls13-ciphers`)
200 ### AES ciphers
209 ### ECC ciphers
465 protocol or does not match the ciphers offered by the server during the SSL
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
Dwpa_common.c2334 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument
2338 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites()
2342 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites()
2346 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites()
2350 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites()
2354 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites()
2358 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites()
2367 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument
2371 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites()
2375 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites()
[all …]

12345678910