Home
last modified time | relevance | path

Searched refs:ciphersuite (Results 1 – 25 of 45) sorted by relevance

12

/third_party/openssl/util/perl/TLSProxy/
DServerHello.pm41 $self->{ciphersuite} = 0;
64 my $ciphersuite = unpack('n', substr($self->data, $ptr));
115 $self->ciphersuite($ciphersuite);
116 TLSProxy::Proxy->ciphersuite($ciphersuite);
125 print " Ciphersuite:".$ciphersuite."\n";
135 TLSProxy::Message->ciphersuite($self->ciphersuite);
149 $data .= pack('n', $self->ciphersuite);
202 sub ciphersuite subroutine
206 $self->{ciphersuite} = shift;
208 return $self->{ciphersuite};
DProxy.pm72 my $ciphersuite = undef;
159 $ciphersuite = undef;
720 sub ciphersuite subroutine
724 $ciphersuite = shift;
726 return $ciphersuite;
DMessage.pm146 my $ciphersuite = 0;
441 sub ciphersuite subroutine
445 $ciphersuite = shift;
447 return $ciphersuite;
DServerKeyExchange.pm48 return if TLSProxy::Proxy->ciphersuite()
50 && TLSProxy::Proxy->ciphersuite()
/third_party/openssl/doc/man3/
DSSL_CTX_set_psk_client_callback.pod49 case the server will have specified a ciphersuite to use already and the PSK
50 must be compatible with the digest for that ciphersuite. The digest will be
69 =item A ciphersuite
71 Only the handshake digest associated with the ciphersuite is relevant for the
72 PSK (the server may go on to negotiate any ciphersuite which is compatible with
73 the digest). The application can use any TLSv1.3 ciphersuite. If B<md> is
74 not NULL the handshake digest for the ciphersuite should be the same.
75 The ciphersuite can be set via a call to <SSL_SESSION_set_cipher(3)>. The
DSSL_CTX_set_cipher_list.pod34 ciphersuite names in order of preference. Valid TLSv1.3 ciphersuite names are:
94 ciphersuite list was configured, and 0 otherwise.
DSSL_SESSION_get0_cipher.pod24 SSL_SESSION_set_cipher() can be used to set the ciphersuite associated with the
DSSL_CIPHER_get_name.pod127 The minimum protocol version that the ciphersuite supports, such as B<TLSv1.2>.
129 ciphersuite was first defined because some ciphersuites are backwards compatible
DSSL_get_client_random.pod45 suitable for the ciphersuite associated with the SSL_SESSION.
/third_party/mbedtls/tests/
DDescriptions.txt14 GnuTLS (and ourselves!) for every common ciphersuite, in every TLS
16 For each ciphersuite/version/side/authmode it performs a full handshake
/third_party/openssl/test/recipes/
D70-test_renegotiation.t106 my @ciphersuite = (0x002f);
107 $message->ciphersuites(\@ciphersuite);
D70-test_tls13hrr.t76 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
/third_party/curl/docs/cmdline-opts/
Dproxy-tls13-ciphers.d2 Arg: <ciphersuite list>
Dtls13-ciphers.d2 Arg: <ciphersuite list>
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_pwd_common.h66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
Deap_pwd_common.c334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument
358 eap_pwd_h_update(hash, (const u8 *) ciphersuite, sizeof(u32)); in compute_keys()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_pwd_common.h66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
Deap_pwd_common.c334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument
358 eap_pwd_h_update(hash, (const u8 *) ciphersuite, sizeof(u32)); in compute_keys()
/third_party/mbedtls/tests/scripts/
Dgenerate_tls13_compat_tests.py79 def __init__(self, ciphersuite, signature_algorithm, named_group, compat_mode=True): argument
83 self.add_ciphersuites(ciphersuite)
/third_party/mbedtls/library/
Dssl_tls13_keys.h520 int ciphersuite,
Dssl_tls13_keys.c800 int ciphersuite, in mbedtls_ssl_tls13_populate_transform() argument
817 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id( ciphersuite ); in mbedtls_ssl_tls13_populate_transform()
821 ciphersuite ) ); in mbedtls_ssl_tls13_populate_transform()
Dssl_srv.c1903 ssl->session_negotiate->ciphersuite = ciphersuites[i]; in ssl_parse_client_hello()
2009 ssl->session_negotiate->ciphersuite ) ) == NULL || in ssl_write_encrypt_then_mac_ext()
2424 if( session->ciphersuite != session_tmp.ciphersuite || in ssl_handle_id_based_session_resumption()
2573 MBEDTLS_PUT_UINT16_BE( ssl->session_negotiate->ciphersuite, p, 0 ); in ssl_write_server_hello()
2578 mbedtls_ssl_get_ciphersuite_name( ssl->session_negotiate->ciphersuite ) ) ); in ssl_write_server_hello()
2616 mbedtls_ssl_ciphersuite_from_id( ssl->session_negotiate->ciphersuite ) ) ) in ssl_write_server_hello()
Dssl_tls.c690 int ciphersuite, in ssl_tls12_populate_transform() argument
753 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id( ciphersuite ); in ssl_tls12_populate_transform()
757 ciphersuite ) ); in ssl_tls12_populate_transform()
808 mbedtls_ssl_get_ciphersuite_name( ciphersuite ) ) ); in ssl_tls12_populate_transform()
1329 ssl->session_negotiate->ciphersuite, in mbedtls_ssl_derive_keys()
4366 return mbedtls_ssl_get_ciphersuite_name( ssl->session->ciphersuite ); in mbedtls_ssl_get_ciphersuite()
4758 MBEDTLS_PUT_UINT16_BE( session->ciphersuite, p, 0 ); in ssl_session_save_tls12()
4983 session->ciphersuite = ( p[0] << 8 ) | p[1]; in ssl_session_load_tls12()
6050 ssl->session->ciphersuite, in ssl_context_load()
6057 ssl_tls12prf_from_cs( ssl->session->ciphersuite ), in ssl_context_load()
[all …]
Dssl_tls13_client.c1162 ssl->session_negotiate->ciphersuite = cipher_suite; in ssl_tls13_parse_server_hello()
1349 ssl->session_negotiate->ciphersuite, in ssl_tls13_finalize_server_hello()
/third_party/openssl/
DNEWS224 o Kerberos ciphersuite support removed
496 o SSL/TLS GOST ciphersuite support.
498 o RFC4279 PSK ciphersuite support.
561 o Various ciphersuite selection fixes.
568 o Changes to ciphersuite selection algorithm
667 o Various ciphersuite selection fixes.
717 o Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug

12