/netbsd-src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
H A D | ServerHello.pm | 41 $self->{ciphersuite} = 0; 64 my $ciphersuite = unpack('n', substr($self->data, $ptr)); 115 $self->ciphersuite($ciphersuite); 116 TLSProxy::Proxy->ciphersuite($ciphersuite); 125 print " Ciphersuite:".$ciphersuite."\n"; 135 TLSProxy::Message->ciphersuite($self->ciphersuite); 149 $data .= pack('n', $self->ciphersuite); 202 sub ciphersuite subroutine 206 $self->{ciphersuite} = shift; 208 return $self->{ciphersuite};
|
H A D | Proxy.pm | 72 my $ciphersuite = undef; 159 $ciphersuite = undef; 720 sub ciphersuite subroutine 724 $ciphersuite = shift; 726 return $ciphersuite;
|
H A D | Message.pm | 146 my $ciphersuite = 0; 441 sub ciphersuite subroutine 445 $ciphersuite = shift; 447 return $ciphersuite;
|
H A D | ServerKeyExchange.pm | 48 return if TLSProxy::Proxy->ciphersuite() 50 && TLSProxy::Proxy->ciphersuite()
|
/netbsd-src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
H A D | ServerHello.pm | 41 $self->{ciphersuite} = 0; 64 my $ciphersuite = unpack('n', substr($self->data, $ptr)); 115 $self->ciphersuite($ciphersuite); 116 TLSProxy::Proxy->ciphersuite($ciphersuite); 125 print " Ciphersuite:".$ciphersuite."\n"; 135 TLSProxy::Message->ciphersuite($self->ciphersuite); 149 $data .= pack('n', $self->ciphersuite); 202 sub ciphersuite subroutine 206 $self->{ciphersuite} = shift; 208 return $self->{ciphersuite};
|
H A D | ServerKeyExchange.pm | 48 return if TLSProxy::Proxy->ciphersuite() 50 && TLSProxy::Proxy->ciphersuite()
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | SSL_CTX_set_psk_client_callback.pod | 49 case the server will have specified a ciphersuite to use already and the PSK 50 must be compatible with the digest for that ciphersuite. The digest will be 69 =item A ciphersuite 71 Only the handshake digest associated with the ciphersuite is relevant for the 72 PSK (the server may go on to negotiate any ciphersuite which is compatible with 73 the digest). The application can use any TLSv1.3 ciphersuite. If B<md> is 74 not NULL the handshake digest for the ciphersuite should be the same. 75 The ciphersuite can be set via a call to <SSL_SESSION_set_cipher(3)>. The
|
H A D | SSL_SESSION_get0_cipher.pod | 24 SSL_SESSION_set_cipher() can be used to set the ciphersuite associated with the
|
H A D | SSL_CIPHER_get_name.pod | 127 The minimum protocol version that the ciphersuite supports, such as B<TLSv1.2>. 129 ciphersuite was first defined because some ciphersuites are backwards compatible
|
H A D | SSL_get_client_random.pod | 45 suitable for the ciphersuite associated with the SSL_SESSION.
|
H A D | SSL_get_ciphers.pod | 72 a ciphersuite is available (i.e. it is configured in the cipher list) and shared
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | SSL_CTX_set_psk_client_callback.pod | 49 case the server will have specified a ciphersuite to use already and the PSK 50 must be compatible with the digest for that ciphersuite. The digest will be 69 =item A ciphersuite 71 Only the handshake digest associated with the ciphersuite is relevant for the 72 PSK (the server may go on to negotiate any ciphersuite which is compatible with 73 the digest). The application can use any TLSv1.3 ciphersuite. If B<md> is 74 not NULL the handshake digest for the ciphersuite should be the same. 75 The ciphersuite can be set via a call to <SSL_SESSION_set_cipher(3)>. The
|
H A D | SSL_CTX_set_cipher_list.pod | 34 ciphersuite names in order of preference. Valid TLSv1.3 ciphersuite names are: 94 ciphersuite list was configured, and 0 otherwise.
|
H A D | SSL_SESSION_get0_cipher.pod | 24 SSL_SESSION_set_cipher() can be used to set the ciphersuite associated with the
|
H A D | SSL_CIPHER_get_name.pod | 127 The minimum protocol version that the ciphersuite supports, such as B<TLSv1.2>. 129 ciphersuite was first defined because some ciphersuites are backwards compatible
|
H A D | SSL_get_client_random.pod | 45 suitable for the ciphersuite associated with the SSL_SESSION.
|
H A D | SSL_get_ciphers.pod | 72 a ciphersuite is available (i.e. it is configured in the cipher list) and shared
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
H A D | 70-test_renegotiation.t | 106 my @ciphersuite = (0x002f); 107 $message->ciphersuites(\@ciphersuite);
|
H A D | 70-test_tls13hrr.t | 90 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/ |
H A D | 70-test_renegotiation.t | 125 my @ciphersuite = (0x002f); 126 $message->ciphersuites(\@ciphersuite);
|
H A D | 70-test_tls13hrr.t | 117 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
|
/netbsd-src/external/bsd/wpa/dist/src/eap_common/ |
H A D | eap_pwd_common.h | 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/ssl-tests/ |
H A D | 14-curves.cnf.in | 173 #ciphersuite
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/ |
H A D | NEWS | 252 o Kerberos ciphersuite support removed 524 o SSL/TLS GOST ciphersuite support. 526 o RFC4279 PSK ciphersuite support. 589 o Various ciphersuite selection fixes. 596 o Changes to ciphersuite selection algorithm 695 o Various ciphersuite selection fixes. 745 o Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug
|
/netbsd-src/external/bsd/openldap/dist/doc/rfc/ |
H A D | rfc4513.txt | 400 TLS_RSA_WITH_3DES_EDE_CBC_SHA ciphersuite and SHOULD support the 401 TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA ciphersuite. Support for the 402 latter ciphersuite is recommended to encourage interoperability with 641 - The ciphersuite's ability to provide adequate confidentiality 653 of confidentiality protection provided by the ciphersuite to 654 ensure that the level of protection afforded by the ciphersuite 657 - The ciphersuite's vulnerability (or lack thereof) to man-in-the- 665 the security services provided by the negotiated ciphersuite are 1761 - TLS ciphersuite recommendations are no longer included in this 1763 TLS_RSA_WITH_3DES_EDE_CBC_SHA ciphersuite and should continue to [all …]
|