/third_party/openssl/util/perl/TLSProxy/ |
D | ServerHello.pm | 41 $self->{ciphersuite} = 0; 64 my $ciphersuite = unpack('n', substr($self->data, $ptr)); 115 $self->ciphersuite($ciphersuite); 116 TLSProxy::Proxy->ciphersuite($ciphersuite); 125 print " Ciphersuite:".$ciphersuite."\n"; 135 TLSProxy::Message->ciphersuite($self->ciphersuite); 149 $data .= pack('n', $self->ciphersuite); 202 sub ciphersuite subroutine 206 $self->{ciphersuite} = shift; 208 return $self->{ciphersuite};
|
D | Proxy.pm | 72 my $ciphersuite = undef; 159 $ciphersuite = undef; 720 sub ciphersuite subroutine 724 $ciphersuite = shift; 726 return $ciphersuite;
|
D | Message.pm | 146 my $ciphersuite = 0; 441 sub ciphersuite subroutine 445 $ciphersuite = shift; 447 return $ciphersuite;
|
D | ServerKeyExchange.pm | 48 return if TLSProxy::Proxy->ciphersuite() 50 && TLSProxy::Proxy->ciphersuite()
|
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/ |
D | ServerHello.pm | 41 $self->{ciphersuite} = 0; 64 my $ciphersuite = unpack('n', substr($self->data, $ptr)); 115 $self->ciphersuite($ciphersuite); 116 TLSProxy::Proxy->ciphersuite($ciphersuite); 125 print " Ciphersuite:".$ciphersuite."\n"; 135 TLSProxy::Message->ciphersuite($self->ciphersuite); 149 $data .= pack('n', $self->ciphersuite); 202 sub ciphersuite subroutine 206 $self->{ciphersuite} = shift; 208 return $self->{ciphersuite};
|
D | Proxy.pm | 72 my $ciphersuite = undef; 159 $ciphersuite = undef; 720 sub ciphersuite subroutine 724 $ciphersuite = shift; 726 return $ciphersuite;
|
D | Message.pm | 146 my $ciphersuite = 0; 441 sub ciphersuite subroutine 445 $ciphersuite = shift; 447 return $ciphersuite;
|
D | ServerKeyExchange.pm | 48 return if TLSProxy::Proxy->ciphersuite() 50 && TLSProxy::Proxy->ciphersuite()
|
/third_party/openssl/doc/man3/ |
D | SSL_CTX_set_psk_client_callback.pod | 49 case the server will have specified a ciphersuite to use already and the PSK 50 must be compatible with the digest for that ciphersuite. The digest will be 69 =item A ciphersuite 71 Only the handshake digest associated with the ciphersuite is relevant for the 72 PSK (the server may go on to negotiate any ciphersuite which is compatible with 73 the digest). The application can use any TLSv1.3 ciphersuite. If B<md> is 74 not NULL the handshake digest for the ciphersuite should be the same. 75 The ciphersuite can be set via a call to <SSL_SESSION_set_cipher(3)>. The
|
D | SSL_CTX_set_cipher_list.pod | 39 ciphersuite names in order of preference. Valid TLSv1.3 ciphersuite names are: 107 ciphersuite list was configured, and 0 otherwise.
|
D | SSL_SESSION_get0_cipher.pod | 24 SSL_SESSION_set_cipher() can be used to set the ciphersuite associated with the
|
/third_party/mbedtls/tests/ |
D | Descriptions.txt | 14 GnuTLS (and ourselves!) for every common ciphersuite, in every TLS 16 For each ciphersuite/version/side/authmode it performs a full handshake
|
/third_party/mbedtls/tests/scripts/ |
D | generate_tls13_compat_tests.py | 79 def __init__(self, ciphersuite=None, signature_algorithm=None, named_group=None, argument 85 if ciphersuite: 86 self.add_ciphersuites(ciphersuite) 463 server_object = SERVER_CLASSES[server](ciphersuite=cipher, 467 client_object = CLIENT_CLASSES[client](ciphersuite=cipher,
|
/third_party/openssl/test/recipes/ |
D | 70-test_renegotiation.t | 125 my @ciphersuite = (0x002f); 126 $message->ciphersuites(\@ciphersuite);
|
D | 70-test_tls13hrr.t | 98 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
|
/third_party/mbedtls/library/ |
D | ssl_tls13_client.c | 666 static psa_algorithm_t ssl_tls13_get_ciphersuite_hash_alg(int ciphersuite) in ssl_tls13_get_ciphersuite_hash_alg() argument 669 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite); in ssl_tls13_get_ciphersuite_hash_alg() 698 ssl, session->ciphersuite); in ssl_tls13_early_data_has_valid_ticket() 714 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_identity() 733 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_psk() 1274 ssl->session_negotiate->ciphersuite); in mbedtls_ssl_tls13_finalize_client_hello() 1706 (cipher_suite != ssl->session_negotiate->ciphersuite)) { in ssl_tls13_parse_server_hello() 1919 ssl->session_negotiate->ciphersuite)) { in ssl_tls13_postprocess_server_hello() 1992 ssl->session_negotiate->ciphersuite = handshake->ciphersuite_info->id; in ssl_tls13_postprocess_server_hello() 2023 ssl->session_negotiate->ciphersuite = ssl->handshake->ciphersuite_info->id; in ssl_tls13_postprocess_hrr() [all …]
|
D | ssl_tls13_server.c | 437 if (cipher_suite != session->ciphersuite) { in ssl_tls13_select_ciphersuite_for_resumption() 636 ssl->session_negotiate->ciphersuite = cipher_suite; in ssl_tls13_parse_pre_shared_key_ext() 1394 ssl->session_negotiate->ciphersuite = cipher_suite; in ssl_tls13_parse_client_hello() 2083 MBEDTLS_PUT_UINT16_BE(ssl->session_negotiate->ciphersuite, p, 0); in ssl_tls13_write_server_hello_body() 2088 ssl->session_negotiate->ciphersuite), in ssl_tls13_write_server_hello_body() 2089 ssl->session_negotiate->ciphersuite)); in ssl_tls13_write_server_hello_body() 2732 session->ciphersuite = ciphersuite_info->id; in ssl_tls13_prepare_new_session_ticket()
|
D | ssl_tls13_keys.h | 529 int ciphersuite,
|
D | ssl_tls.c | 411 int ciphersuite, 1753 mbedtls_ssl_ciphersuite_from_id(session->ciphersuite); in mbedtls_ssl_set_session() 1759 session->ciphersuite)); in mbedtls_ssl_set_session() 2537 MBEDTLS_PUT_UINT16_BE(session->ciphersuite, p, 1); in ssl_tls13_session_save() 2597 session->ciphersuite = MBEDTLS_GET_UINT16_BE(p, 1); in ssl_tls13_session_load() 3291 return ssl->session->ciphersuite; in mbedtls_ssl_get_ciphersuite_id_from_ssl() 3300 return mbedtls_ssl_get_ciphersuite_name(ssl->session->ciphersuite); in mbedtls_ssl_get_ciphersuite() 4660 prf_func = ssl_tls12prf_from_cs(ssl->session->ciphersuite); in ssl_context_load() 4671 ssl->session->ciphersuite, in ssl_context_load() 5698 const mbedtls_ssl_ciphersuite_t *ciphersuite, in mbedtls_ssl_check_cert_usage() argument [all …]
|
/third_party/curl/docs/cmdline-opts/ |
D | tls13-ciphers.md | 5 Arg: <ciphersuite list>
|
D | proxy-tls13-ciphers.md | 5 Arg: <ciphersuite list>
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_pwd_common.h | 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
D | eap_pwd_common.c | 334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument 358 eap_pwd_h_update(hash, (const u8 *) ciphersuite, sizeof(u32)); in compute_keys()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_pwd_common.h | 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
D | eap_pwd_common.c | 334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument 358 eap_pwd_h_update(hash, (const u8 *) ciphersuite, sizeof(u32)); in compute_keys()
|