/third_party/openssl/util/perl/TLSProxy/ |
D | ServerHello.pm | 41 $self->{ciphersuite} = 0; 64 my $ciphersuite = unpack('n', substr($self->data, $ptr)); 115 $self->ciphersuite($ciphersuite); 116 TLSProxy::Proxy->ciphersuite($ciphersuite); 125 print " Ciphersuite:".$ciphersuite."\n"; 135 TLSProxy::Message->ciphersuite($self->ciphersuite); 149 $data .= pack('n', $self->ciphersuite); 202 sub ciphersuite subroutine 206 $self->{ciphersuite} = shift; 208 return $self->{ciphersuite};
|
D | Proxy.pm | 72 my $ciphersuite = undef; 159 $ciphersuite = undef; 720 sub ciphersuite subroutine 724 $ciphersuite = shift; 726 return $ciphersuite;
|
D | Message.pm | 146 my $ciphersuite = 0; 441 sub ciphersuite subroutine 445 $ciphersuite = shift; 447 return $ciphersuite;
|
D | ServerKeyExchange.pm | 48 return if TLSProxy::Proxy->ciphersuite() 50 && TLSProxy::Proxy->ciphersuite()
|
/third_party/openssl/doc/man3/ |
D | SSL_CTX_set_psk_client_callback.pod | 49 case the server will have specified a ciphersuite to use already and the PSK 50 must be compatible with the digest for that ciphersuite. The digest will be 69 =item A ciphersuite 71 Only the handshake digest associated with the ciphersuite is relevant for the 72 PSK (the server may go on to negotiate any ciphersuite which is compatible with 73 the digest). The application can use any TLSv1.3 ciphersuite. If B<md> is 74 not NULL the handshake digest for the ciphersuite should be the same. 75 The ciphersuite can be set via a call to <SSL_SESSION_set_cipher(3)>. The
|
D | SSL_CTX_set_cipher_list.pod | 34 ciphersuite names in order of preference. Valid TLSv1.3 ciphersuite names are: 94 ciphersuite list was configured, and 0 otherwise.
|
D | SSL_SESSION_get0_cipher.pod | 24 SSL_SESSION_set_cipher() can be used to set the ciphersuite associated with the
|
D | SSL_CIPHER_get_name.pod | 127 The minimum protocol version that the ciphersuite supports, such as B<TLSv1.2>. 129 ciphersuite was first defined because some ciphersuites are backwards compatible
|
D | SSL_get_client_random.pod | 45 suitable for the ciphersuite associated with the SSL_SESSION.
|
/third_party/mbedtls/tests/ |
D | Descriptions.txt | 14 GnuTLS (and ourselves!) for every common ciphersuite, in every TLS 16 For each ciphersuite/version/side/authmode it performs a full handshake
|
/third_party/openssl/test/recipes/ |
D | 70-test_renegotiation.t | 106 my @ciphersuite = (0x002f); 107 $message->ciphersuites(\@ciphersuite);
|
D | 70-test_tls13hrr.t | 76 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
|
/third_party/curl/docs/cmdline-opts/ |
D | proxy-tls13-ciphers.d | 2 Arg: <ciphersuite list>
|
D | tls13-ciphers.d | 2 Arg: <ciphersuite list>
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_pwd_common.h | 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
D | eap_pwd_common.c | 334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument 358 eap_pwd_h_update(hash, (const u8 *) ciphersuite, sizeof(u32)); in compute_keys()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_pwd_common.h | 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
D | eap_pwd_common.c | 334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument 358 eap_pwd_h_update(hash, (const u8 *) ciphersuite, sizeof(u32)); in compute_keys()
|
/third_party/mbedtls/tests/scripts/ |
D | generate_tls13_compat_tests.py | 79 def __init__(self, ciphersuite, signature_algorithm, named_group, compat_mode=True): argument 83 self.add_ciphersuites(ciphersuite)
|
/third_party/mbedtls/library/ |
D | ssl_tls13_keys.h | 520 int ciphersuite,
|
D | ssl_tls13_keys.c | 800 int ciphersuite, in mbedtls_ssl_tls13_populate_transform() argument 817 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id( ciphersuite ); in mbedtls_ssl_tls13_populate_transform() 821 ciphersuite ) ); in mbedtls_ssl_tls13_populate_transform()
|
D | ssl_srv.c | 1903 ssl->session_negotiate->ciphersuite = ciphersuites[i]; in ssl_parse_client_hello() 2009 ssl->session_negotiate->ciphersuite ) ) == NULL || in ssl_write_encrypt_then_mac_ext() 2424 if( session->ciphersuite != session_tmp.ciphersuite || in ssl_handle_id_based_session_resumption() 2573 MBEDTLS_PUT_UINT16_BE( ssl->session_negotiate->ciphersuite, p, 0 ); in ssl_write_server_hello() 2578 mbedtls_ssl_get_ciphersuite_name( ssl->session_negotiate->ciphersuite ) ) ); in ssl_write_server_hello() 2616 mbedtls_ssl_ciphersuite_from_id( ssl->session_negotiate->ciphersuite ) ) ) in ssl_write_server_hello()
|
D | ssl_tls.c | 690 int ciphersuite, in ssl_tls12_populate_transform() argument 753 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id( ciphersuite ); in ssl_tls12_populate_transform() 757 ciphersuite ) ); in ssl_tls12_populate_transform() 808 mbedtls_ssl_get_ciphersuite_name( ciphersuite ) ) ); in ssl_tls12_populate_transform() 1329 ssl->session_negotiate->ciphersuite, in mbedtls_ssl_derive_keys() 4366 return mbedtls_ssl_get_ciphersuite_name( ssl->session->ciphersuite ); in mbedtls_ssl_get_ciphersuite() 4758 MBEDTLS_PUT_UINT16_BE( session->ciphersuite, p, 0 ); in ssl_session_save_tls12() 4983 session->ciphersuite = ( p[0] << 8 ) | p[1]; in ssl_session_load_tls12() 6050 ssl->session->ciphersuite, in ssl_context_load() 6057 ssl_tls12prf_from_cs( ssl->session->ciphersuite ), in ssl_context_load() [all …]
|
D | ssl_tls13_client.c | 1162 ssl->session_negotiate->ciphersuite = cipher_suite; in ssl_tls13_parse_server_hello() 1349 ssl->session_negotiate->ciphersuite, in ssl_tls13_finalize_server_hello()
|
/third_party/openssl/ |
D | NEWS | 224 o Kerberos ciphersuite support removed 496 o SSL/TLS GOST ciphersuite support. 498 o RFC4279 PSK ciphersuite support. 561 o Various ciphersuite selection fixes. 568 o Changes to ciphersuite selection algorithm 667 o Various ciphersuite selection fixes. 717 o Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug
|