Home
last modified time | relevance | path

Searched refs:ciphersuites (Results 1 – 25 of 55) sorted by relevance

123

/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/
DClientHello.pm37 $self->{ciphersuites} = [];
59 my @ciphersuites = unpack('n*', substr($self->data, $ptr,
88 $self->ciphersuites(\@ciphersuites);
142 $data .= pack("n*", @{$self->ciphersuites});
208 sub ciphersuites subroutine
212 $self->{ciphersuites} = shift;
214 return $self->{ciphersuites};
/third_party/openssl/util/perl/TLSProxy/
DClientHello.pm37 $self->{ciphersuites} = [];
59 my @ciphersuites = unpack('n*', substr($self->data, $ptr,
88 $self->ciphersuites(\@ciphersuites);
142 $data .= pack("n*", @{$self->ciphersuites});
208 sub ciphersuites subroutine
212 $self->{ciphersuites} = shift;
214 return $self->{ciphersuites};
/third_party/openssl/test/recipes/
D80-test_ssl_old.t454 my %ciphersuites = ();
468 $ciphersuites{$protocol} = [ map { s|\R||; split(/:/, $_) }
470 $protocolciphersuitecount += scalar @{$ciphersuites{$protocol}};
476 if $protocolciphersuitecount + scalar(keys %ciphersuites) == 0;
482 + scalar(keys %ciphersuites);
490 foreach my $protocol (sort keys %ciphersuites) {
495 my $ciphersuites = "";
496 foreach my $cipher (@{$ciphersuites{$protocol}}) {
502 $ciphersuites = $cipher;
509 "-ciphersuites", $ciphersuites,
D70-test_tls13downgrade.t110 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA);
111 $message->ciphersuite_len(2 * scalar @ciphersuites);
112 $message->ciphersuites(\@ciphersuites);
D70-test_tls13hrr.t144 my @ciphersuites = (TLSProxy::Message::CIPHER_TLS13_AES_128_GCM_SHA256);
145 $ch1->ciphersuite_len(2 * scalar @ciphersuites);
146 $ch1->ciphersuites(\@ciphersuites);
D70-test_renegotiation.t126 $message->ciphersuites(\@ciphersuite);
/third_party/openssl/apps/
Dciphers.c103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local
166 ciphersuites = opt_arg(); in ciphers_main()
207 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) { in ciphers_main()
Ds_time.c122 char *cipher = NULL, *ciphersuites = NULL; in s_time_main() local
193 ciphersuites = opt_arg(); in s_time_main()
257 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) in s_time_main()
/third_party/node/deps/openssl/openssl/apps/
Dciphers.c103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local
166 ciphersuites = opt_arg(); in ciphers_main()
207 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) { in ciphers_main()
Ds_time.c122 char *cipher = NULL, *ciphersuites = NULL; in s_time_main() local
193 ciphersuites = opt_arg(); in s_time_main()
257 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) in s_time_main()
/third_party/mbedtls/programs/test/
Ddlopen.c65 const int *ciphersuites = ssl_list_ciphersuites(); in main() local
66 for (n = 0; ciphersuites[n] != 0; n++) {/* nothing to do, we're just counting */ in main()
/third_party/openssl/doc/man3/
DSSL_CTX_set_cipher_list.pod32 ciphersuites. Use SSL_CTX_set_ciphersuites() to configure those.
38 ciphersuites for B<ctx>. This is a simple colon (":") separated list of TLSv1.3
60 configures the ciphersuites for B<ssl>.
64 cipher string for TLSv1.3 ciphersuites.
DSSL_CTX_set_tmp_dh_callback.pod37 Some ciphersuites may use ephemeral Diffie-Hellman (DH) key exchange. In these
67 If there is no certificate (e.g. for PSK ciphersuites), then it it will be
98 cipher suites. Modern OpenSSL does not support export ciphersuites and so these
DSSL_CONF_cmd.pod173 combined with any configured TLSv1.3 ciphersuites. Note: syntax checking
177 =item B<-ciphersuites> I<1.3ciphers>
179 Sets the available ciphersuites for TLSv1.3 to value. This is a
181 list will be combined any configured TLSv1.2 and below ciphersuites.
279 combined with any configured TLSv1.3 ciphersuites. Note: syntax
285 Sets the available ciphersuites for TLSv1.3 to B<value>. This is a
287 list will be combined any configured TLSv1.2 and below ciphersuites.
532 by the negotiated ciphersuites and extensions. Equivalent to
/third_party/mbedtls/tests/scripts/
Dgenerate_tls13_compat_tests.py96 def add_ciphersuites(self, *ciphersuites): argument
98 [cipher for cipher in ciphersuites if cipher not in self._ciphers])
155 ciphersuites = ':'.join(self._ciphers)
156 ret += ["-ciphersuites {ciphersuites}".format(ciphersuites=ciphersuites)]
/third_party/openssl/doc/man1/
Dopenssl-s_time.pod.in27 [B<-ciphersuites> I<val>]
99 This list will be combined with any TLSv1.3 ciphersuites that have been
104 =item B<-ciphersuites> I<val>
106 This allows the TLSv1.3 ciphersuites sent by the client to be modified. This
107 list will be combined with any TLSv1.2 and below ciphersuites that have been
Dopenssl-ciphers.pod.in25 [B<-ciphersuites> I<val>]
95 =item B<-ciphersuites> I<val>
97 Sets the list of TLSv1.3 ciphersuites. This list will be combined with any
98 TLSv1.2 and below ciphersuites that have been configured. The format for this
106 A cipher list of TLSv1.2 and below ciphersuites to convert to a cipher
107 preference list. This list will be combined with any TLSv1.3 ciphersuites that
Dopenssl-s_server.pod.in110 [B<-ciphersuites> I<val>]
650 This allows the list of TLSv1.2 and below ciphersuites used by the server to be
651 modified. This list is combined with any TLSv1.3 ciphersuites that have been
657 =item B<-ciphersuites> I<val>
659 This allows the list of TLSv1.3 ciphersuites used by the server to be modified.
660 This list is combined with any TLSv1.2 and below ciphersuites that have been
/third_party/mbedtls/configs/
DREADME.txt4 a restricted number of ciphersuites) and aim at minimizing resource usage for
/third_party/mbedtls/docs/
D3.0-migration-guide.md650 future 1.3 which will have a different concept of ciphersuites), support for
651 configuring ciphersuites separately for each version via
653 `mbedtls_ssl_conf_ciphersuites()` to configure ciphersuites to use with (D)TLS
698 ### Remove support for TLS RC4-based ciphersuites
701 list of ciphersuites, as RC4-based ciphersuites were already not negotiated in
704 Please switch to any of the modern, recommended ciphersuites (based on
708 ### Remove support for TLS single-DES ciphersuites
713 Please switch to any of the modern, recommended ciphersuites (based on
818 ### Remove the configuration to enable weak ciphersuites in SSL / TLS
824 recommended ciphersuites (based on AES-GCM, AES-CCM or ChachaPoly for example)
[all …]
/third_party/mbedtls/library/
Dssl_tls12_server.c904 const int *ciphersuites; in ssl_parse_client_hello() local
1594 ciphersuites = ssl->conf->ciphersuite_list; in ssl_parse_client_hello()
1599 for (i = 0; ciphersuites[i] != 0; i++) { in ssl_parse_client_hello()
1600 if (MBEDTLS_GET_UINT16_BE(p, 0) != ciphersuites[i]) { in ssl_parse_client_hello()
1606 if ((ret = ssl_ciphersuite_match(ssl, ciphersuites[i], in ssl_parse_client_hello()
1617 for (i = 0; ciphersuites[i] != 0; i++) { in ssl_parse_client_hello()
1619 if (MBEDTLS_GET_UINT16_BE(p, 0) != ciphersuites[i]) { in ssl_parse_client_hello()
1625 if ((ret = ssl_ciphersuite_match(ssl, ciphersuites[i], in ssl_parse_client_hello()
1653 ssl->session_negotiate->ciphersuite = ciphersuites[i]; in ssl_parse_client_hello()
/third_party/openssl/test/
Dssl_old_test.c612 static char *ciphersuites = NULL; variable
1056 ciphersuites = *(++argv); in main()
1465 if (ciphersuites != NULL) { in main()
1466 if (!SSL_CTX_set_ciphersuites(c_ctx, ciphersuites) in main()
1467 || !SSL_CTX_set_ciphersuites(s_ctx, ciphersuites) in main()
1468 || !SSL_CTX_set_ciphersuites(s_ctx2, ciphersuites)) { in main()
/third_party/mbedtls/
DChangeLog913 * Drop support for RC4 TLS ciphersuites.
914 * Drop support for single-DES ciphersuites.
1098 ciphersuites per version, which are no longer relevant. This removes the
1108 * Remove all the 3DES ciphersuites:
1253 * Fix a regression introduced in 2.24.0 which broke (D)TLS CBC ciphersuites
1669 * In (D)TLS record decryption, when using a CBC ciphersuites without the
2278 * Add MBEDTLS_REMOVE_3DES_CIPHERSUITES to allow removing 3DES ciphersuites
2433 attack. In TLS, this affects servers that accept ciphersuites based on
2434 RSA decryption (i.e. ciphersuites whose name contains RSA but not
2492 implemented client-side, for ECDHE-ECDSA ciphersuites in TLS 1.2,
[all …]
/third_party/node/deps/openssl/openssl/
DCHANGES.md805 * Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK (RFC 5489)
806 to the list of ciphersuites providing Perfect Forward Secrecy as
3078 * Added a new API for TLSv1.3 ciphersuites:
3114 configuration. TLSv1.3 ciphersuites are not compatible with TLSv1.2 and
3115 below. Similarly TLSv1.2 ciphersuites are not compatible with TLSv1.3.
3117 would otherwise inadvertently disable all TLSv1.3 ciphersuites the
3829 default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very
3841 TLS connections using `*-CHACHA20-POLY1305` ciphersuites are susceptible to
4226 * RC4 based libssl ciphersuites are now classed as "weak" ciphers and are
4442 support for GOST ciphersuites (these are only activated if a GOST engine
[all …]
/third_party/openssl/
DCHANGES.md627 * Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK (RFC 5489)
628 to the list of ciphersuites providing Perfect Forward Secrecy as
2900 * Added a new API for TLSv1.3 ciphersuites:
2936 configuration. TLSv1.3 ciphersuites are not compatible with TLSv1.2 and
2937 below. Similarly TLSv1.2 ciphersuites are not compatible with TLSv1.3.
2939 would otherwise inadvertently disable all TLSv1.3 ciphersuites the
3651 default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very
3663 TLS connections using `*-CHACHA20-POLY1305` ciphersuites are susceptible to
4048 * RC4 based libssl ciphersuites are now classed as "weak" ciphers and are
4264 support for GOST ciphersuites (these are only activated if a GOST engine
[all …]

123