Lines Matching defs:ciphersuite
3375 * Any ciphersuite using SHA256 will do - it will be compatible with
3376 * the actual ciphersuite selected as long as it too is based on SHA256
4449 * So updating ciphersuite in 'sess' which will get reflected in
4640 * Test 0: Set a default ciphersuite in the SSL_CTX (no explicit cipher_list)
4641 * Test 1: Set a non-default ciphersuite in the SSL_CTX (no explicit cipher_list)
4642 * Test 2: Set a default ciphersuite in the SSL (no explicit cipher_list)
4643 * Test 3: Set a non-default ciphersuite in the SSL (no explicit cipher_list)
4644 * Test 4: Set a default ciphersuite in the SSL_CTX (SSL_CTX cipher_list)
4645 * Test 5: Set a non-default ciphersuite in the SSL_CTX (SSL_CTX cipher_list)
4646 * Test 6: Set a default ciphersuite in the SSL (SSL_CTX cipher_list)
4647 * Test 7: Set a non-default ciphersuite in the SSL (SSL_CTX cipher_list)
4648 * Test 8: Set a default ciphersuite in the SSL (SSL cipher_list)
4649 * Test 9: Set a non-default ciphersuite in the SSL (SSL cipher_list)
4671 /* Default ciphersuite */
4676 /* Non default ciphersuite */
4693 /* Default ciphersuite */
4698 /* Non default ciphersuite */
4751 /* Check we can resume a session with a different SHA-256 ciphersuite */
4828 * ciphersuite, but client thinks the session is for SHA-256, so it should
4981 * Must include an EC ciphersuite so that we send supported groups in
5427 * We use a ciphersuite with SHA256 to ease testing old style PSK
9771 const char *ciphersuite = "DHE-RSA-AES128-SHA";
9808 ciphersuite = "ADH-AES128-SHA256:@SECLEVEL=0";
9812 ciphersuite = "ADH-AES256-SHA256:@SECLEVEL=0";
9834 || !TEST_true(SSL_set_cipher_list(serverssl, ciphersuite))
9835 || !TEST_true(SSL_set_cipher_list(clientssl, ciphersuite)))