Home
last modified time | relevance | path

Searched refs:ciphersuite (Results 1 – 25 of 58) sorted by relevance

123

/third_party/openssl/util/perl/TLSProxy/
DServerHello.pm41 $self->{ciphersuite} = 0;
64 my $ciphersuite = unpack('n', substr($self->data, $ptr));
115 $self->ciphersuite($ciphersuite);
116 TLSProxy::Proxy->ciphersuite($ciphersuite);
125 print " Ciphersuite:".$ciphersuite."\n";
135 TLSProxy::Message->ciphersuite($self->ciphersuite);
149 $data .= pack('n', $self->ciphersuite);
202 sub ciphersuite subroutine
206 $self->{ciphersuite} = shift;
208 return $self->{ciphersuite};
DProxy.pm72 my $ciphersuite = undef;
159 $ciphersuite = undef;
720 sub ciphersuite subroutine
724 $ciphersuite = shift;
726 return $ciphersuite;
DMessage.pm146 my $ciphersuite = 0;
441 sub ciphersuite subroutine
445 $ciphersuite = shift;
447 return $ciphersuite;
DServerKeyExchange.pm48 return if TLSProxy::Proxy->ciphersuite()
50 && TLSProxy::Proxy->ciphersuite()
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/
DServerHello.pm41 $self->{ciphersuite} = 0;
64 my $ciphersuite = unpack('n', substr($self->data, $ptr));
115 $self->ciphersuite($ciphersuite);
116 TLSProxy::Proxy->ciphersuite($ciphersuite);
125 print " Ciphersuite:".$ciphersuite."\n";
135 TLSProxy::Message->ciphersuite($self->ciphersuite);
149 $data .= pack('n', $self->ciphersuite);
202 sub ciphersuite subroutine
206 $self->{ciphersuite} = shift;
208 return $self->{ciphersuite};
DProxy.pm72 my $ciphersuite = undef;
159 $ciphersuite = undef;
720 sub ciphersuite subroutine
724 $ciphersuite = shift;
726 return $ciphersuite;
DMessage.pm146 my $ciphersuite = 0;
441 sub ciphersuite subroutine
445 $ciphersuite = shift;
447 return $ciphersuite;
DServerKeyExchange.pm48 return if TLSProxy::Proxy->ciphersuite()
50 && TLSProxy::Proxy->ciphersuite()
/third_party/openssl/doc/man3/
DSSL_CTX_set_psk_client_callback.pod49 case the server will have specified a ciphersuite to use already and the PSK
50 must be compatible with the digest for that ciphersuite. The digest will be
69 =item A ciphersuite
71 Only the handshake digest associated with the ciphersuite is relevant for the
72 PSK (the server may go on to negotiate any ciphersuite which is compatible with
73 the digest). The application can use any TLSv1.3 ciphersuite. If B<md> is
74 not NULL the handshake digest for the ciphersuite should be the same.
75 The ciphersuite can be set via a call to <SSL_SESSION_set_cipher(3)>. The
DSSL_CTX_set_cipher_list.pod39 ciphersuite names in order of preference. Valid TLSv1.3 ciphersuite names are:
107 ciphersuite list was configured, and 0 otherwise.
DSSL_SESSION_get0_cipher.pod24 SSL_SESSION_set_cipher() can be used to set the ciphersuite associated with the
/third_party/mbedtls/tests/
DDescriptions.txt14 GnuTLS (and ourselves!) for every common ciphersuite, in every TLS
16 For each ciphersuite/version/side/authmode it performs a full handshake
/third_party/mbedtls/tests/scripts/
Dgenerate_tls13_compat_tests.py79 def __init__(self, ciphersuite=None, signature_algorithm=None, named_group=None, argument
85 if ciphersuite:
86 self.add_ciphersuites(ciphersuite)
463 server_object = SERVER_CLASSES[server](ciphersuite=cipher,
467 client_object = CLIENT_CLASSES[client](ciphersuite=cipher,
/third_party/openssl/test/recipes/
D70-test_renegotiation.t125 my @ciphersuite = (0x002f);
126 $message->ciphersuites(\@ciphersuite);
D70-test_tls13hrr.t98 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
/third_party/mbedtls/library/
Dssl_tls13_client.c666 static psa_algorithm_t ssl_tls13_get_ciphersuite_hash_alg(int ciphersuite) in ssl_tls13_get_ciphersuite_hash_alg() argument
669 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite); in ssl_tls13_get_ciphersuite_hash_alg()
698 ssl, session->ciphersuite); in ssl_tls13_early_data_has_valid_ticket()
714 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_identity()
733 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_psk()
1274 ssl->session_negotiate->ciphersuite); in mbedtls_ssl_tls13_finalize_client_hello()
1706 (cipher_suite != ssl->session_negotiate->ciphersuite)) { in ssl_tls13_parse_server_hello()
1919 ssl->session_negotiate->ciphersuite)) { in ssl_tls13_postprocess_server_hello()
1992 ssl->session_negotiate->ciphersuite = handshake->ciphersuite_info->id; in ssl_tls13_postprocess_server_hello()
2023 ssl->session_negotiate->ciphersuite = ssl->handshake->ciphersuite_info->id; in ssl_tls13_postprocess_hrr()
[all …]
Dssl_tls13_server.c437 if (cipher_suite != session->ciphersuite) { in ssl_tls13_select_ciphersuite_for_resumption()
636 ssl->session_negotiate->ciphersuite = cipher_suite; in ssl_tls13_parse_pre_shared_key_ext()
1394 ssl->session_negotiate->ciphersuite = cipher_suite; in ssl_tls13_parse_client_hello()
2083 MBEDTLS_PUT_UINT16_BE(ssl->session_negotiate->ciphersuite, p, 0); in ssl_tls13_write_server_hello_body()
2088 ssl->session_negotiate->ciphersuite), in ssl_tls13_write_server_hello_body()
2089 ssl->session_negotiate->ciphersuite)); in ssl_tls13_write_server_hello_body()
2732 session->ciphersuite = ciphersuite_info->id; in ssl_tls13_prepare_new_session_ticket()
Dssl_tls13_keys.h529 int ciphersuite,
Dssl_tls.c411 int ciphersuite,
1753 mbedtls_ssl_ciphersuite_from_id(session->ciphersuite); in mbedtls_ssl_set_session()
1759 session->ciphersuite)); in mbedtls_ssl_set_session()
2537 MBEDTLS_PUT_UINT16_BE(session->ciphersuite, p, 1); in ssl_tls13_session_save()
2597 session->ciphersuite = MBEDTLS_GET_UINT16_BE(p, 1); in ssl_tls13_session_load()
3291 return ssl->session->ciphersuite; in mbedtls_ssl_get_ciphersuite_id_from_ssl()
3300 return mbedtls_ssl_get_ciphersuite_name(ssl->session->ciphersuite); in mbedtls_ssl_get_ciphersuite()
4660 prf_func = ssl_tls12prf_from_cs(ssl->session->ciphersuite); in ssl_context_load()
4671 ssl->session->ciphersuite, in ssl_context_load()
5698 const mbedtls_ssl_ciphersuite_t *ciphersuite, in mbedtls_ssl_check_cert_usage() argument
[all …]
/third_party/curl/docs/cmdline-opts/
Dtls13-ciphers.md5 Arg: <ciphersuite list>
Dproxy-tls13-ciphers.md5 Arg: <ciphersuite list>
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_pwd_common.h66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
Deap_pwd_common.c334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument
358 eap_pwd_h_update(hash, (const u8 *) ciphersuite, sizeof(u32)); in compute_keys()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_pwd_common.h66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
Deap_pwd_common.c334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument
358 eap_pwd_h_update(hash, (const u8 *) ciphersuite, sizeof(u32)); in compute_keys()

123