Lines Matching defs:ciphersuites
3884 static const char *ciphersuites[] = {
3925 if (!TEST_true(SSL_CTX_set_ciphersuites(sctx, ciphersuites[cipher]))
3926 || !TEST_true(SSL_CTX_set_ciphersuites(cctx, ciphersuites[cipher])))
4083 idx % OSSL_NELEM(ciphersuites),
4084 idx / OSSL_NELEM(ciphersuites));
4094 idx % OSSL_NELEM(ciphersuites),
4095 idx / OSSL_NELEM(ciphersuites));
4106 idx % OSSL_NELEM(ciphersuites),
4107 idx / OSSL_NELEM(ciphersuites));
4117 idx % OSSL_NELEM(ciphersuites),
4118 idx / OSSL_NELEM(ciphersuites));
4389 * Test TLSv1.3 PSK can be used to send early_data with all 5 ciphersuites
4638 * Test configuring the TLSv1.3 ciphersuites
4771 * Check attempting to resume a SHA-256 session with no SHA-256 ciphersuites
5365 * multiple ciphersuites
7696 * We can't establish a connection (even in TLSv1.1) with these ciphersuites if
7742 * This test combines TLSv1.3 and TLSv1.2 ciphersuites so they must both be
7784 * libctx, we want one peer to always use the full set of ciphersuites
7787 * having the full set of ciphersuites and once with the server side.
9368 /* Ensure we only use TLSv1.2 ciphersuites based on SHA256 */
11304 ADD_ALL_TESTS(test_early_data_skip, OSSL_NELEM(ciphersuites) * 3);
11305 ADD_ALL_TESTS(test_early_data_skip_hrr, OSSL_NELEM(ciphersuites) * 3);
11306 ADD_ALL_TESTS(test_early_data_skip_hrr_fail, OSSL_NELEM(ciphersuites) * 3);
11307 ADD_ALL_TESTS(test_early_data_skip_abort, OSSL_NELEM(ciphersuites) * 3);