Home
last modified time | relevance | path

Searched refs:ciphersuite (Results 1 – 25 of 45) sorted by relevance

12

/netbsd-src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
H A DServerHello.pm41 $self->{ciphersuite} = 0;
64 my $ciphersuite = unpack('n', substr($self->data, $ptr));
115 $self->ciphersuite($ciphersuite);
116 TLSProxy::Proxy->ciphersuite($ciphersuite);
125 print " Ciphersuite:".$ciphersuite."\n";
135 TLSProxy::Message->ciphersuite($self->ciphersuite);
149 $data .= pack('n', $self->ciphersuite);
202 sub ciphersuite subroutine
206 $self->{ciphersuite} = shift;
208 return $self->{ciphersuite};
H A DProxy.pm72 my $ciphersuite = undef;
159 $ciphersuite = undef;
720 sub ciphersuite subroutine
724 $ciphersuite = shift;
726 return $ciphersuite;
H A DMessage.pm146 my $ciphersuite = 0;
441 sub ciphersuite subroutine
445 $ciphersuite = shift;
447 return $ciphersuite;
H A DServerKeyExchange.pm48 return if TLSProxy::Proxy->ciphersuite()
50 && TLSProxy::Proxy->ciphersuite()
/netbsd-src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
H A DServerHello.pm41 $self->{ciphersuite} = 0;
64 my $ciphersuite = unpack('n', substr($self->data, $ptr));
115 $self->ciphersuite($ciphersuite);
116 TLSProxy::Proxy->ciphersuite($ciphersuite);
125 print " Ciphersuite:".$ciphersuite."\n";
135 TLSProxy::Message->ciphersuite($self->ciphersuite);
149 $data .= pack('n', $self->ciphersuite);
202 sub ciphersuite subroutine
206 $self->{ciphersuite} = shift;
208 return $self->{ciphersuite};
H A DServerKeyExchange.pm48 return if TLSProxy::Proxy->ciphersuite()
50 && TLSProxy::Proxy->ciphersuite()
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/
H A DSSL_CTX_set_psk_client_callback.pod49 case the server will have specified a ciphersuite to use already and the PSK
50 must be compatible with the digest for that ciphersuite. The digest will be
69 =item A ciphersuite
71 Only the handshake digest associated with the ciphersuite is relevant for the
72 PSK (the server may go on to negotiate any ciphersuite which is compatible with
73 the digest). The application can use any TLSv1.3 ciphersuite. If B<md> is
74 not NULL the handshake digest for the ciphersuite should be the same.
75 The ciphersuite can be set via a call to <SSL_SESSION_set_cipher(3)>. The
H A DSSL_SESSION_get0_cipher.pod24 SSL_SESSION_set_cipher() can be used to set the ciphersuite associated with the
H A DSSL_CIPHER_get_name.pod127 The minimum protocol version that the ciphersuite supports, such as B<TLSv1.2>.
129 ciphersuite was first defined because some ciphersuites are backwards compatible
H A DSSL_get_client_random.pod45 suitable for the ciphersuite associated with the SSL_SESSION.
H A DSSL_get_ciphers.pod72 a ciphersuite is available (i.e. it is configured in the cipher list) and shared
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/
H A DSSL_CTX_set_psk_client_callback.pod49 case the server will have specified a ciphersuite to use already and the PSK
50 must be compatible with the digest for that ciphersuite. The digest will be
69 =item A ciphersuite
71 Only the handshake digest associated with the ciphersuite is relevant for the
72 PSK (the server may go on to negotiate any ciphersuite which is compatible with
73 the digest). The application can use any TLSv1.3 ciphersuite. If B<md> is
74 not NULL the handshake digest for the ciphersuite should be the same.
75 The ciphersuite can be set via a call to <SSL_SESSION_set_cipher(3)>. The
H A DSSL_CTX_set_cipher_list.pod34 ciphersuite names in order of preference. Valid TLSv1.3 ciphersuite names are:
94 ciphersuite list was configured, and 0 otherwise.
H A DSSL_SESSION_get0_cipher.pod24 SSL_SESSION_set_cipher() can be used to set the ciphersuite associated with the
H A DSSL_CIPHER_get_name.pod127 The minimum protocol version that the ciphersuite supports, such as B<TLSv1.2>.
129 ciphersuite was first defined because some ciphersuites are backwards compatible
H A DSSL_get_client_random.pod45 suitable for the ciphersuite associated with the SSL_SESSION.
H A DSSL_get_ciphers.pod72 a ciphersuite is available (i.e. it is configured in the cipher list) and shared
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/recipes/
H A D70-test_renegotiation.t106 my @ciphersuite = (0x002f);
107 $message->ciphersuites(\@ciphersuite);
H A D70-test_tls13hrr.t90 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
/netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/
H A D70-test_renegotiation.t125 my @ciphersuite = (0x002f);
126 $message->ciphersuites(\@ciphersuite);
H A D70-test_tls13hrr.t117 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
/netbsd-src/external/bsd/wpa/dist/src/eap_common/
H A Deap_pwd_common.h66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
/netbsd-src/crypto/external/bsd/openssl/dist/test/ssl-tests/
H A D14-curves.cnf.in173 #ciphersuite
/netbsd-src/crypto/external/bsd/openssl.old/dist/
H A DNEWS252 o Kerberos ciphersuite support removed
524 o SSL/TLS GOST ciphersuite support.
526 o RFC4279 PSK ciphersuite support.
589 o Various ciphersuite selection fixes.
596 o Changes to ciphersuite selection algorithm
695 o Various ciphersuite selection fixes.
745 o Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug
/netbsd-src/external/bsd/openldap/dist/doc/rfc/
H A Drfc4513.txt400 TLS_RSA_WITH_3DES_EDE_CBC_SHA ciphersuite and SHOULD support the
401 TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA ciphersuite. Support for the
402 latter ciphersuite is recommended to encourage interoperability with
641 - The ciphersuite's ability to provide adequate confidentiality
653 of confidentiality protection provided by the ciphersuite to
654 ensure that the level of protection afforded by the ciphersuite
657 - The ciphersuite's vulnerability (or lack thereof) to man-in-the-
665 the security services provided by the negotiated ciphersuite are
1761 - TLS ciphersuite recommendations are no longer included in this
1763 TLS_RSA_WITH_3DES_EDE_CBC_SHA ciphersuite and should continue to
[all …]

12