/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/ |
D | ClientHello.pm | 37 $self->{ciphersuites} = []; 59 my @ciphersuites = unpack('n*', substr($self->data, $ptr, 88 $self->ciphersuites(\@ciphersuites); 142 $data .= pack("n*", @{$self->ciphersuites}); 208 sub ciphersuites subroutine 212 $self->{ciphersuites} = shift; 214 return $self->{ciphersuites};
|
/third_party/openssl/util/perl/TLSProxy/ |
D | ClientHello.pm | 37 $self->{ciphersuites} = []; 59 my @ciphersuites = unpack('n*', substr($self->data, $ptr, 88 $self->ciphersuites(\@ciphersuites); 142 $data .= pack("n*", @{$self->ciphersuites}); 208 sub ciphersuites subroutine 212 $self->{ciphersuites} = shift; 214 return $self->{ciphersuites};
|
/third_party/openssl/test/recipes/ |
D | 80-test_ssl_old.t | 454 my %ciphersuites = (); 468 $ciphersuites{$protocol} = [ map { s|\R||; split(/:/, $_) } 470 $protocolciphersuitecount += scalar @{$ciphersuites{$protocol}}; 476 if $protocolciphersuitecount + scalar(keys %ciphersuites) == 0; 482 + scalar(keys %ciphersuites); 490 foreach my $protocol (sort keys %ciphersuites) { 495 my $ciphersuites = ""; 496 foreach my $cipher (@{$ciphersuites{$protocol}}) { 502 $ciphersuites = $cipher; 509 "-ciphersuites", $ciphersuites,
|
D | 70-test_tls13downgrade.t | 110 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA); 111 $message->ciphersuite_len(2 * scalar @ciphersuites); 112 $message->ciphersuites(\@ciphersuites);
|
D | 70-test_tls13hrr.t | 144 my @ciphersuites = (TLSProxy::Message::CIPHER_TLS13_AES_128_GCM_SHA256); 145 $ch1->ciphersuite_len(2 * scalar @ciphersuites); 146 $ch1->ciphersuites(\@ciphersuites);
|
D | 70-test_renegotiation.t | 126 $message->ciphersuites(\@ciphersuite);
|
/third_party/openssl/apps/ |
D | ciphers.c | 103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local 166 ciphersuites = opt_arg(); in ciphers_main() 207 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) { in ciphers_main()
|
D | s_time.c | 122 char *cipher = NULL, *ciphersuites = NULL; in s_time_main() local 193 ciphersuites = opt_arg(); in s_time_main() 257 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) in s_time_main()
|
/third_party/node/deps/openssl/openssl/apps/ |
D | ciphers.c | 103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local 166 ciphersuites = opt_arg(); in ciphers_main() 207 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) { in ciphers_main()
|
D | s_time.c | 122 char *cipher = NULL, *ciphersuites = NULL; in s_time_main() local 193 ciphersuites = opt_arg(); in s_time_main() 257 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) in s_time_main()
|
/third_party/mbedtls/programs/test/ |
D | dlopen.c | 65 const int *ciphersuites = ssl_list_ciphersuites(); in main() local 66 for (n = 0; ciphersuites[n] != 0; n++) {/* nothing to do, we're just counting */ in main()
|
/third_party/openssl/doc/man3/ |
D | SSL_CTX_set_cipher_list.pod | 32 ciphersuites. Use SSL_CTX_set_ciphersuites() to configure those. 38 ciphersuites for B<ctx>. This is a simple colon (":") separated list of TLSv1.3 60 configures the ciphersuites for B<ssl>. 64 cipher string for TLSv1.3 ciphersuites.
|
D | SSL_CTX_set_tmp_dh_callback.pod | 37 Some ciphersuites may use ephemeral Diffie-Hellman (DH) key exchange. In these 67 If there is no certificate (e.g. for PSK ciphersuites), then it it will be 98 cipher suites. Modern OpenSSL does not support export ciphersuites and so these
|
D | SSL_CONF_cmd.pod | 173 combined with any configured TLSv1.3 ciphersuites. Note: syntax checking 177 =item B<-ciphersuites> I<1.3ciphers> 179 Sets the available ciphersuites for TLSv1.3 to value. This is a 181 list will be combined any configured TLSv1.2 and below ciphersuites. 279 combined with any configured TLSv1.3 ciphersuites. Note: syntax 285 Sets the available ciphersuites for TLSv1.3 to B<value>. This is a 287 list will be combined any configured TLSv1.2 and below ciphersuites. 532 by the negotiated ciphersuites and extensions. Equivalent to
|
/third_party/mbedtls/tests/scripts/ |
D | generate_tls13_compat_tests.py | 96 def add_ciphersuites(self, *ciphersuites): argument 98 [cipher for cipher in ciphersuites if cipher not in self._ciphers]) 155 ciphersuites = ':'.join(self._ciphers) 156 ret += ["-ciphersuites {ciphersuites}".format(ciphersuites=ciphersuites)]
|
/third_party/openssl/doc/man1/ |
D | openssl-s_time.pod.in | 27 [B<-ciphersuites> I<val>] 99 This list will be combined with any TLSv1.3 ciphersuites that have been 104 =item B<-ciphersuites> I<val> 106 This allows the TLSv1.3 ciphersuites sent by the client to be modified. This 107 list will be combined with any TLSv1.2 and below ciphersuites that have been
|
D | openssl-ciphers.pod.in | 25 [B<-ciphersuites> I<val>] 95 =item B<-ciphersuites> I<val> 97 Sets the list of TLSv1.3 ciphersuites. This list will be combined with any 98 TLSv1.2 and below ciphersuites that have been configured. The format for this 106 A cipher list of TLSv1.2 and below ciphersuites to convert to a cipher 107 preference list. This list will be combined with any TLSv1.3 ciphersuites that
|
D | openssl-s_server.pod.in | 110 [B<-ciphersuites> I<val>] 650 This allows the list of TLSv1.2 and below ciphersuites used by the server to be 651 modified. This list is combined with any TLSv1.3 ciphersuites that have been 657 =item B<-ciphersuites> I<val> 659 This allows the list of TLSv1.3 ciphersuites used by the server to be modified. 660 This list is combined with any TLSv1.2 and below ciphersuites that have been
|
/third_party/mbedtls/configs/ |
D | README.txt | 4 a restricted number of ciphersuites) and aim at minimizing resource usage for
|
/third_party/mbedtls/docs/ |
D | 3.0-migration-guide.md | 650 future 1.3 which will have a different concept of ciphersuites), support for 651 configuring ciphersuites separately for each version via 653 `mbedtls_ssl_conf_ciphersuites()` to configure ciphersuites to use with (D)TLS 698 ### Remove support for TLS RC4-based ciphersuites 701 list of ciphersuites, as RC4-based ciphersuites were already not negotiated in 704 Please switch to any of the modern, recommended ciphersuites (based on 708 ### Remove support for TLS single-DES ciphersuites 713 Please switch to any of the modern, recommended ciphersuites (based on 818 ### Remove the configuration to enable weak ciphersuites in SSL / TLS 824 recommended ciphersuites (based on AES-GCM, AES-CCM or ChachaPoly for example) [all …]
|
/third_party/mbedtls/library/ |
D | ssl_tls12_server.c | 904 const int *ciphersuites; in ssl_parse_client_hello() local 1594 ciphersuites = ssl->conf->ciphersuite_list; in ssl_parse_client_hello() 1599 for (i = 0; ciphersuites[i] != 0; i++) { in ssl_parse_client_hello() 1600 if (MBEDTLS_GET_UINT16_BE(p, 0) != ciphersuites[i]) { in ssl_parse_client_hello() 1606 if ((ret = ssl_ciphersuite_match(ssl, ciphersuites[i], in ssl_parse_client_hello() 1617 for (i = 0; ciphersuites[i] != 0; i++) { in ssl_parse_client_hello() 1619 if (MBEDTLS_GET_UINT16_BE(p, 0) != ciphersuites[i]) { in ssl_parse_client_hello() 1625 if ((ret = ssl_ciphersuite_match(ssl, ciphersuites[i], in ssl_parse_client_hello() 1653 ssl->session_negotiate->ciphersuite = ciphersuites[i]; in ssl_parse_client_hello()
|
/third_party/openssl/test/ |
D | ssl_old_test.c | 612 static char *ciphersuites = NULL; variable 1056 ciphersuites = *(++argv); in main() 1465 if (ciphersuites != NULL) { in main() 1466 if (!SSL_CTX_set_ciphersuites(c_ctx, ciphersuites) in main() 1467 || !SSL_CTX_set_ciphersuites(s_ctx, ciphersuites) in main() 1468 || !SSL_CTX_set_ciphersuites(s_ctx2, ciphersuites)) { in main()
|
/third_party/mbedtls/ |
D | ChangeLog | 913 * Drop support for RC4 TLS ciphersuites. 914 * Drop support for single-DES ciphersuites. 1098 ciphersuites per version, which are no longer relevant. This removes the 1108 * Remove all the 3DES ciphersuites: 1253 * Fix a regression introduced in 2.24.0 which broke (D)TLS CBC ciphersuites 1669 * In (D)TLS record decryption, when using a CBC ciphersuites without the 2278 * Add MBEDTLS_REMOVE_3DES_CIPHERSUITES to allow removing 3DES ciphersuites 2433 attack. In TLS, this affects servers that accept ciphersuites based on 2434 RSA decryption (i.e. ciphersuites whose name contains RSA but not 2492 implemented client-side, for ECDHE-ECDSA ciphersuites in TLS 1.2, [all …]
|
/third_party/node/deps/openssl/openssl/ |
D | CHANGES.md | 805 * Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK (RFC 5489) 806 to the list of ciphersuites providing Perfect Forward Secrecy as 3078 * Added a new API for TLSv1.3 ciphersuites: 3114 configuration. TLSv1.3 ciphersuites are not compatible with TLSv1.2 and 3115 below. Similarly TLSv1.2 ciphersuites are not compatible with TLSv1.3. 3117 would otherwise inadvertently disable all TLSv1.3 ciphersuites the 3829 default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very 3841 TLS connections using `*-CHACHA20-POLY1305` ciphersuites are susceptible to 4226 * RC4 based libssl ciphersuites are now classed as "weak" ciphers and are 4442 support for GOST ciphersuites (these are only activated if a GOST engine [all …]
|
/third_party/openssl/ |
D | CHANGES.md | 627 * Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK (RFC 5489) 628 to the list of ciphersuites providing Perfect Forward Secrecy as 2900 * Added a new API for TLSv1.3 ciphersuites: 2936 configuration. TLSv1.3 ciphersuites are not compatible with TLSv1.2 and 2937 below. Similarly TLSv1.2 ciphersuites are not compatible with TLSv1.3. 2939 would otherwise inadvertently disable all TLSv1.3 ciphersuites the 3651 default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very 3663 TLS connections using `*-CHACHA20-POLY1305` ciphersuites are susceptible to 4048 * RC4 based libssl ciphersuites are now classed as "weak" ciphers and are 4264 support for GOST ciphersuites (these are only activated if a GOST engine [all …]
|