/third_party/openssl/test/ |
D | gosttest.c | 23 } ciphers[] = { variable 46 ciphers[idx].certnum == 0 ? cert1 in test_tls13() 48 ciphers[idx].certnum == 0 ? privkey1 in test_tls13() 52 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, ciphers[idx].cipher)) in test_tls13() 53 || !TEST_true(SSL_CTX_set_cipher_list(sctx, ciphers[idx].cipher)) in test_tls13() 58 if (ciphers[idx].expected_prot == 0) { in test_tls13() 66 ciphers[idx].expected_prot)) in test_tls13() 89 ADD_ALL_TESTS(test_tls13, OSSL_NELEM(ciphers)); in setup_tests()
|
D | cipherlist_test.c | 150 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist() 159 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist() 163 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist() 169 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist() 179 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist()
|
D | dtls_mtu_test.c | 147 STACK_OF(SSL_CIPHER) *ciphers; in run_mtu_tests() 165 ciphers = SSL_CTX_get_ciphers(ctx); in run_mtu_tests() 166 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in run_mtu_tests() 167 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in run_mtu_tests()
|
/third_party/curl/docs/cmdline-opts/ |
D | ciphers.d | 1 Long: ciphers 2 Arg: <list of ciphers> 3 Help: SSL ciphers to use 7 Specifies which ciphers to use in the connection. The list of ciphers must 8 specify valid ciphers. Read up on SSL cipher list details on this URL:
|
D | tls13-ciphers.d | 1 Long: tls13-ciphers 8 1.3. The list of ciphers suites must specify valid ciphers. Read up on TLS 1.3 15 cipher suites by using the --ciphers option.
|
D | proxy-tls13-ciphers.d | 1 Long: proxy-tls13-ciphers 8 when it negotiates TLS 1.3. The list of ciphers suites must specify valid 9 ciphers. Read up on TLS 1.3 cipher suite details on this URL: 15 cipher suites by using the --proxy-ciphers option.
|
D | proxy-ciphers.d | 1 Long: proxy-ciphers 3 Help: SSL ciphers to use for proxy 7 Same as --ciphers but used in HTTPS proxy context.
|
/third_party/node/test/parallel/ |
D | test-tls-multi-pfx.js | 20 const ciphers = []; variable 26 ciphers: 'ECDHE-ECDSA-AES256-GCM-SHA384', property 29 ciphers.push(ecdsa.getCipher()); 31 ciphers: 'ECDHE-RSA-AES256-GCM-SHA384', property 34 ciphers.push(rsa.getCipher()); 43 assert.deepStrictEqual(ciphers, [{
|
D | test-tls-client-default-ciphers.js | 33 let ciphers = ''; 36 ciphers = options.ciphers; 42 assert.strictEqual(ciphers, tls.DEFAULT_CIPHERS);
|
D | test-tls-dhe.js | 40 const ciphers = 'DHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256'; constant 55 ciphers: ciphers, property 70 '-cipher', ciphers];
|
D | test-tls-getcipher.js | 50 ciphers: 'AES128-SHA256', property 64 ciphers: 'ECDHE-RSA-AES128-GCM-SHA256', property 79 ciphers: 'TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_CCM_8_SHA256', property 86 ciphers: 'TLS_AES_128_CCM_8_SHA256', property
|
D | test-tls-set-ciphers-error.js | 15 ciphers: 'aes256-sha' property 19 options.ciphers = 'FOOBARBAZ'; 22 options.ciphers = 'TLS_not_a_cipher';
|
/third_party/openssl/doc/man3/ |
D | SSL_CTX_set_cipher_list.pod | 23 SSL_CTX_set_cipher_list() sets the list of available ciphers (TLSv1.2 and below) 25 in L<ciphers(1)>. The list of ciphers is inherited by all 29 SSL_set_cipher_list() sets the list of ciphers (TLSv1.2 and below) only for 61 on details of the library configuration (ciphers compiled in). Thus no 63 corresponding ciphers are not compiled in or because they are mistyped, 64 are simply ignored. Failure is only flagged if no ciphers could be collected 70 additional restrictions apply. All ciphers have additional requirements. 71 ADH ciphers don't need a certificate, but DH-parameters must have been set. 72 All other ciphers need a corresponding certificate and key. 75 RSA ciphers using DHE need a certificate and key and additional DH-parameters [all …]
|
D | SSL_get_ciphers.pod | 31 sorted by preference. If B<ssl> is NULL or no ciphers are available, NULL 40 SRP and PSK ciphers are only enabled if the appropriate callbacks or settings 42 The list of ciphers that would be sent in a ClientHello can differ from 43 the list of ciphers that would be acceptable when acting as a server. 44 For example, additional ciphers may be usable by a server if there is 45 a gap in the list of supported protocols, and some ciphers may not be 47 If B<ssl> is NULL or no ciphers are available, NULL is returned. 50 list received from the client on B<ssl>. If B<ssl> is NULL, no ciphers are 62 listed for B<ssl> with B<priority>. If B<ssl> is NULL, no ciphers are 63 available, or there are less ciphers than B<priority> available, NULL [all …]
|
D | OpenSSL_add_all_algorithms.pod | 24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses 25 this table to lookup ciphers via functions such as EVP_get_cipher_byname(). 30 ciphers). 35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
|
/third_party/openssl/crypto/engine/ |
D | tb_cipher.c | 26 if (e->ciphers) { in ENGINE_register_ciphers() 28 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers() 47 if (e->ciphers) { in ENGINE_set_default_ciphers() 49 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers() 83 return e->ciphers; in ENGINE_get_ciphers() 89 e->ciphers = f; in ENGINE_set_ciphers()
|
/third_party/openssl/test/recipes/ |
D | 20-test_enc_more.t | 30 my @ciphers = 36 plan tests => 2 + scalar @ciphers; 39 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 43 skip "Not initialized, skipping...", scalar(@ciphers); 46 foreach my $cipher (@ciphers) {
|
D | 20-test_enc.t | 31 my @ciphers = 36 plan tests => 2 + (scalar @ciphers)*2; 39 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 43 skip "Not initialized, skipping...", scalar(@ciphers); 46 foreach my $c (@ciphers) {
|
D | 70-test_sslsigalgs.t | 130 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 146 $proxy->ciphers("ECDHE-RSA-AES128-SHA\@SECLEVEL=1"); 156 $proxy->ciphers("DEFAULT\@SECLEVEL=2"); 166 $proxy->ciphers("DEFAULT\@SECLEVEL=1"); 174 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 182 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 191 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 199 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 210 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 218 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); [all …]
|
/third_party/openssl/doc/man1/ |
D | ciphers.pod | 5 openssl-ciphers, 6 ciphers - SSL cipher display and cipher list tool 10 B<openssl> B<ciphers> 30 The B<ciphers> command converts textual OpenSSL cipher lists into ordered 44 Only list supported ciphers: those consistent with the security level, and 48 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp> 53 On a server the list of supported ciphers might also exclude other ciphers 56 If this option is not used then all ciphers that match the cipherlist will be 78 In combination with the B<-s> option, list the ciphers which could be used if 119 cipher suites of a certain type. For example B<SHA1> represents all ciphers [all …]
|
/third_party/nghttp2/ |
D | mkcipherlist.py | 295 ciphers = [] variable 306 ciphers.append((id, name)) 311 for id, name in ciphers: 318 for id, name in ciphers:
|
/third_party/node/lib/ |
D | _tls_common.js | 197 if (options.ciphers && typeof options.ciphers !== 'string') { 199 'options.ciphers', 'string', options.ciphers); 206 const ciphers = (options.ciphers || tls.DEFAULT_CIPHERS).split(':'); 207 const cipherList = ciphers.filter((_) => !_.match(/^TLS_/) && 209 const cipherSuites = ciphers.filter((_) => _.match(/^TLS_/)).join(':'); 214 throw new ERR_INVALID_OPT_VALUE('ciphers', ciphers);
|
/third_party/curl/lib/vtls/ |
D | gskit.c | 320 } ciphers[CURL_GSKPROTO_LAST]; in set_ciphers() local 335 memset((char *) ciphers, 0, sizeof(ciphers)); in set_ciphers() 337 ciphers[i].buf = malloc(l); in set_ciphers() 338 if(!ciphers[i].buf) { in set_ciphers() 340 free(ciphers[i].buf); in set_ciphers() 343 ciphers[i].ptr = ciphers[i].buf; in set_ciphers() 344 *ciphers[i].ptr = '\0'; in set_ciphers() 369 strcpy(ciphers[i].ptr, ctp->gsktoken); in set_ciphers() 370 ciphers[i].ptr += strlen(ctp->gsktoken); in set_ciphers() 382 if(!(*protoflags & (1 << i)) || !ciphers[i].buf[0]) { in set_ciphers() [all …]
|
/third_party/curl/docs/ |
D | CIPHERS.md | 6 [`--ciphers`](https://curl.se/docs/manpage.html#--ciphers) 7 users can control which ciphers to consider when negotiating TLS connections. 9 TLS 1.3 ciphers are supported since curl 7.61 for OpenSSL 1.1.1+ with options 12 [`--tls13-ciphers`](https://curl.se/docs/manpage.html#--tls13-ciphers) 16 The names of the known ciphers differ depending on which TLS backend that 21 (based on [OpenSSL docs](https://www.openssl.org/docs/man1.1.0/apps/ciphers.html)) 159 (Note these ciphers are set with `CURLOPT_TLS13_CIPHERS` and `--tls13-ciphers`) 200 ### AES ciphers 209 ### ECC ciphers 465 protocol or does not match the ciphers offered by the server during the SSL [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
D | wpa_common.c | 2334 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument 2338 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites() 2342 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites() 2346 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites() 2350 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites() 2354 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites() 2358 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites() 2367 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument 2371 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites() 2375 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites() [all …]
|