Home
last modified time | relevance | path

Searched refs:ciphers (Results 1 – 25 of 231) sorted by relevance

12345678910

/netbsd-src/crypto/external/bsd/openssl.old/dist/test/
H A Dgosttest.c23 } ciphers[] = { variable
46 ciphers[idx].certnum == 0 ? cert1 in test_tls13()
48 ciphers[idx].certnum == 0 ? privkey1 in test_tls13()
52 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, ciphers[idx].cipher)) in test_tls13()
53 || !TEST_true(SSL_CTX_set_cipher_list(sctx, ciphers[idx].cipher)) in test_tls13()
58 if (ciphers[idx].expected_prot == 0) { in test_tls13()
66 ciphers[idx].expected_prot)) in test_tls13()
89 ADD_ALL_TESTS(test_tls13, OSSL_NELEM(ciphers)); in setup_tests()
H A Dcipherlist_test.c150 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist()
159 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist()
163 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist()
169 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist()
179 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist()
H A Ddtls_mtu_test.c147 STACK_OF(SSL_CIPHER) *ciphers; in run_mtu_tests()
165 ciphers = SSL_CTX_get_ciphers(ctx); in run_mtu_tests()
166 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in run_mtu_tests()
167 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in run_mtu_tests()
/netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/
H A D20-test_enc_more.t35 my @ciphers =
40 @ciphers = grep {!/^-(bf|blowfish|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb
41 |desx|idea|rc2|rc4|seed)/x} @ciphers
44 plan tests => 2 + scalar @ciphers;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $cipher (@ciphers) {
H A D20-test_enc.t36 my @ciphers =
40 @ciphers = grep {!/^(bf|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb|desx|idea
41 |rc2|rc4|seed)/x} @ciphers
44 plan tests => 2 + (scalar @ciphers)*2;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $c (@ciphers) {
H A D70-test_sslsigalgs.t132 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
148 $proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=0");
158 $proxy->ciphers("DEFAULT:\@SECLEVEL=1");
168 $proxy->ciphers("DEFAULT:\@SECLEVEL=0");
176 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
184 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
193 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
201 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
212 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
220 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
[all …]
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/
H A DSSL_CTX_set_cipher_list.pod23 SSL_CTX_set_cipher_list() sets the list of available ciphers (TLSv1.2 and below)
25 in L<ciphers(1)>. The list of ciphers is inherited by all
29 SSL_set_cipher_list() sets the list of ciphers (TLSv1.2 and below) only for
61 on details of the library configuration (ciphers compiled in). Thus no
63 corresponding ciphers are not compiled in or because they are mistyped,
64 are simply ignored. Failure is only flagged if no ciphers could be collected
70 additional restrictions apply. All ciphers have additional requirements.
71 ADH ciphers don't need a certificate, but DH-parameters must have been set.
72 All other ciphers need a corresponding certificate and key.
75 RSA ciphers using DHE need a certificate and key and additional DH-parameters
[all …]
H A DSSL_get_ciphers.pod31 sorted by preference. If B<ssl> is NULL or no ciphers are available, NULL
40 SRP and PSK ciphers are only enabled if the appropriate callbacks or settings
42 The list of ciphers that would be sent in a ClientHello can differ from
43 the list of ciphers that would be acceptable when acting as a server.
44 For example, additional ciphers may be usable by a server if there is
45 a gap in the list of supported protocols, and some ciphers may not be
47 If B<ssl> is NULL or no ciphers are available, NULL is returned.
50 list received from the client on B<ssl>. If B<ssl> is NULL, no ciphers are
62 listed for B<ssl> with B<priority>. If B<ssl> is NULL, no ciphers are
63 available, or there are less ciphers than B<priority> available, NULL
[all …]
H A DOpenSSL_add_all_algorithms.pod24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses
25 this table to lookup ciphers via functions such as EVP_get_cipher_byname().
30 ciphers).
35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/engine/
H A Dtb_cipher.c26 if (e->ciphers) { in ENGINE_register_ciphers()
28 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers()
47 if (e->ciphers) { in ENGINE_set_default_ciphers()
49 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers()
83 return e->ciphers; in ENGINE_get_ciphers()
89 e->ciphers = f; in ENGINE_set_ciphers()
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/engine/
H A Dtb_cipher.c29 if (e->ciphers) { in ENGINE_register_ciphers()
31 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers()
50 if (e->ciphers) { in ENGINE_set_default_ciphers()
52 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers()
87 return e->ciphers; in ENGINE_get_ciphers()
93 e->ciphers = f; in ENGINE_set_ciphers()
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man1/
H A Dciphers.pod5 openssl-ciphers,
6 ciphers - SSL cipher display and cipher list tool
10 B<openssl> B<ciphers>
30 The B<ciphers> command converts textual OpenSSL cipher lists into ordered
44 Only list supported ciphers: those consistent with the security level, and
48 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp>
53 On a server the list of supported ciphers might also exclude other ciphers
56 If this option is not used then all ciphers that match the cipherlist will be
78 In combination with the B<-s> option, list the ciphers which could be used if
119 cipher suites of a certain type. For example B<SHA1> represents all ciphers
[all …]
H A Denc.pod13 [B<-ciphers>]
48 using various block and stream ciphers using keys based on passwords
62 List all supported ciphers.
64 =item B<-ciphers>
66 Alias of -list to display all supported ciphers.
210 engine-provided ciphers, because this form is processed before the
212 Use the B<list> command to get a list of supported ciphers.
218 ciphers which are supported by the OpenSSL core or another engine specified
221 When the enc command lists supported ciphers, ciphers provided by engines,
237 Some of the ciphers do not have large keys and others have security
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/providers/
H A Dfips.module.sources504 providers/implementations/ciphers/cipher_aes.c
505 providers/implementations/ciphers/cipher_aes.h
506 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha.c
507 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha.h
508 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha1_hw.c
509 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
510 providers/implementations/ciphers/cipher_aes_ccm.c
511 providers/implementations/ciphers/cipher_aes_ccm.h
512 providers/implementations/ciphers/cipher_aes_ccm_hw.c
513 providers/implementations/ciphers/cipher_aes_ccm_hw_aesni.inc
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man1/
H A Dopenssl-ciphers.pod.in6 openssl-ciphers - SSL cipher display and cipher list command
10 B<openssl> B<ciphers>
47 Only list supported ciphers: those consistent with the security level, and
51 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp>
56 On a server the list of supported ciphers might also exclude other ciphers
59 If this option is not used then all ciphers that match the cipherlist will be
82 In combination with the B<-s> option, list the ciphers which could be used if
123 cipher suites of a certain type. For example B<SHA1> represents all ciphers
135 If B<!> is used then the ciphers are permanently deleted from the list.
136 The ciphers deleted can never reappear in the list even if they are
[all …]
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/recipes/
H A D20-test_enc_more.t30 my @ciphers =
36 plan tests => 2 + scalar @ciphers;
39 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
43 skip "Not initialized, skipping...", scalar(@ciphers);
46 foreach my $cipher (@ciphers) {
H A D20-test_enc.t31 my @ciphers =
36 plan tests => 2 + (scalar @ciphers)*2;
39 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
43 skip "Not initialized, skipping...", scalar(@ciphers);
46 foreach my $c (@ciphers) {
H A D70-test_sslsigalgs.t130 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
146 $proxy->ciphers("ECDHE-RSA-AES128-SHA\@SECLEVEL=1");
156 $proxy->ciphers("DEFAULT\@SECLEVEL=2");
166 $proxy->ciphers("DEFAULT\@SECLEVEL=1");
174 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
182 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
191 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
199 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
210 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
218 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/
H A DSSL_get_ciphers.pod31 sorted by preference. If B<ssl> is NULL or no ciphers are available, NULL
40 SRP and PSK ciphers are only enabled if the appropriate callbacks or settings
42 The list of ciphers that would be sent in a ClientHello can differ from
43 the list of ciphers that would be acceptable when acting as a server.
44 For example, additional ciphers may be usable by a server if there is
45 a gap in the list of supported protocols, and some ciphers may not be
47 If B<ssl> is NULL or no ciphers are available, NULL is returned.
50 list received from the client on B<ssl>. If B<ssl> is NULL, no ciphers are
62 listed for B<ssl> with B<priority>. If B<ssl> is NULL, no ciphers are
63 available, or there are less ciphers than B<priority> available, NULL
[all …]
H A DOpenSSL_add_all_algorithms.pod24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses
25 this table to lookup ciphers via functions such as EVP_get_cipher_byname().
30 ciphers).
35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
/netbsd-src/sys/net80211/
H A Dieee80211_crypto.c72 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable
174 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none; in ieee80211_crypto_attach()
209 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { in ieee80211_crypto_register()
214 ciphers[cip->ic_cipher] = cip; in ieee80211_crypto_register()
228 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { in ieee80211_crypto_unregister()
235 ciphers[cip->ic_cipher] = NULL; in ieee80211_crypto_unregister()
241 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL; in ieee80211_crypto_available()
285 cip = ciphers[cipher]; in ieee80211_crypto_newkey()
304 cip = ciphers[cipher]; in ieee80211_crypto_newkey()
/netbsd-src/libexec/httpd/
H A Dssl-bozo.c76 char *ciphers; member
273 sslinfo->ciphers ? sslinfo->ciphers : BOZO_SSL_CIPHERS)) in bozo_ssl_init()
275 "Error setting cipher list '%s'", sslinfo->ciphers); in bozo_ssl_init()
375 bozo_ssl_set_ciphers(bozohttpd_t *httpd, const char *ciphers) in bozo_ssl_set_ciphers() argument
379 sslinfo->ciphers = bozostrdup(httpd, NULL, ciphers); in bozo_ssl_set_ciphers()
380 debug((httpd, DEBUG_NORMAL, "using ciphers: %s", sslinfo->ciphers)); in bozo_ssl_set_ciphers()
/netbsd-src/external/mpl/bind/dist/lib/dns/
H A Dtransport.c61 char *ciphers;
268 dns_transport_set_ciphers(dns_transport_t *transport, const char *ciphers) { in dns_transport_set_ciphers()
273 if (transport->tls.ciphers != NULL) { in dns_transport_set_ciphers()
274 isc_mem_free(transport->mctx, transport->tls.ciphers); in dns_transport_set_ciphers()
277 if (ciphers != NULL) {
278 transport->tls.ciphers = isc_mem_strdup(transport->mctx,
279 ciphers); in dns_transport_set_tlsname()
303 return transport->tls.ciphers; in dns_transport_get_tlsname()
396 const char *ciphers = NULL; in dns_transport_find()
449 ciphers
56 char *ciphers; global() member
263 dns_transport_set_ciphers(dns_transport_t * transport,const char * ciphers) dns_transport_set_ciphers() argument
[all...]
/netbsd-src/crypto/external/bsd/openssl/dist/test/
H A Dcipherlist_test.c150 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist()
159 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist()
163 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist()
169 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist()
179 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist()
/netbsd-src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
H A DProxy.pm102 ciphers => "AES128-SHA",
170 $self->{ciphers} = "AES128-SHA";
233 if ($self->ciphers ne "") {
234 $execcmd .= " -cipher ".$self->ciphers;
623 sub ciphers subroutine
627 $self->{ciphers} = shift;
629 return $self->{ciphers};

12345678910