/freebsd-13-stable/contrib/bearssl/src/ssl/ |
H A D | ssl_server_mine2c.c | 33 static const uint16_t suites[] = { local 44 * Set suites and elliptic curve implementation (for ECDHE). 46 br_ssl_engine_set_suites(&cc->eng, suites, 47 (sizeof suites) / (sizeof suites[0]));
|
H A D | ssl_server_mine2g.c | 33 static const uint16_t suites[] = { local 44 * Set suites and elliptic curve implementation (for ECDHE). 46 br_ssl_engine_set_suites(&cc->eng, suites, 47 (sizeof suites) / (sizeof suites[0]));
|
H A D | ssl_server_minf2c.c | 33 static const uint16_t suites[] = { local 44 * Set suites and elliptic curve implementation (for ECDHE). 46 br_ssl_engine_set_suites(&cc->eng, suites, 47 (sizeof suites) / (sizeof suites[0]));
|
H A D | ssl_server_minf2g.c | 33 static const uint16_t suites[] = { local 44 * Set suites and elliptic curve implementation (for ECDHE). 46 br_ssl_engine_set_suites(&cc->eng, suites, 47 (sizeof suites) / (sizeof suites[0]));
|
H A D | ssl_server_minr2g.c | 33 static const uint16_t suites[] = { local 44 * Set suites. 46 br_ssl_engine_set_suites(&cc->eng, suites, 47 (sizeof suites) / (sizeof suites[0]));
|
H A D | ssl_server_minu2g.c | 33 static const uint16_t suites[] = { local 44 * Set suites. 46 br_ssl_engine_set_suites(&cc->eng, suites, 47 (sizeof suites) / (sizeof suites[0]));
|
H A D | ssl_server_minv2g.c | 33 static const uint16_t suites[] = { local 44 * Set suites. 46 br_ssl_engine_set_suites(&cc->eng, suites, 47 (sizeof suites) / (sizeof suites[0]));
|
H A D | ssl_server_full_ec.c | 34 * The "full" profile supports all implemented cipher suites. 47 * Note that for ECDH suites, the list will be automatically 50 static const uint16_t suites[] = { local 103 * Set suites and elliptic curve implementation (for ECDHE). 105 br_ssl_engine_set_suites(&cc->eng, suites, 106 (sizeof suites) / (sizeof suites[0]));
|
H A D | ssl_server_full_rsa.c | 34 * The "full" profile supports all implemented cipher suites. 46 static const uint16_t suites[] = { local 92 * Set suites and elliptic curve implementation (for ECDHE). 94 br_ssl_engine_set_suites(&cc->eng, suites, 95 (sizeof suites) / (sizeof suites[0]));
|
H A D | ssl_client_full.c | 34 * The "full" profile supports all implemented cipher suites. 52 static const uint16_t suites[] = { local 131 * Set suites and asymmetric crypto implementations. We use the 136 br_ssl_engine_set_suites(&cc->eng, suites, 137 (sizeof suites) / (sizeof suites[0]));
|
H A D | ssl_engine.c | 1021 const uint16_t *suites, size_t suites_num) 1023 if ((suites_num * sizeof *suites) > sizeof cc->suites_buf) { 1027 memcpy(cc->suites_buf, suites, suites_num * sizeof *suites); 1020 br_ssl_engine_set_suites(br_ssl_engine_context *cc, const uint16_t *suites, size_t suites_num) argument
|
/freebsd-13-stable/contrib/bearssl/samples/ |
H A D | custom_profile.c | 29 * configures a list of cipher suites and algorithm implementations. 38 * supported (protocol versions and cipher suites). 51 * A list of cipher suites, by preference (first is most 52 * preferred). The list below contains all cipher suites supported 55 static const uint16_t suites[] = { local 114 * -- cipher suites with a name ending in "SHA384" need "prf_sha384"; 131 * -- With TLS 1.2, cipher suites with a name ending in "SHA384" 133 * -- With TLS 1.2, cipher suites with a name ending in "SHA256" 135 * -- With TLS 1.2, cipher suites with a name ending in "SHA" 140 * cipher suites), an 461 static const uint16_t suites[] = { local [all...] |
/freebsd-13-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_client.c | 445 u16 *suites; local 461 suites = conn->cipher_suites; 462 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA256; 463 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA256; 464 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA; 465 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA; 466 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA256; 467 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA256; 468 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA; 469 suites[coun 789 u16 *suites; local [all...] |
H A D | tlsv1_server.c | 381 u16 *suites; local 399 suites = conn->cipher_suites; 400 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA256; 401 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA256; 402 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA; 403 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA; 404 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA256; 405 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA256; 406 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA; 407 suites[coun 689 u16 *suites; local [all...] |
/freebsd-13-stable/contrib/bearssl/tools/ |
H A D | client.c | 492 " -cs names set list of supported cipher suites (comma-separated)\n"); 522 cipher_suite *suites; local 553 suites = NULL; 733 if (suites != NULL) { 735 " of cipher suites\n"); 739 suites = parse_suites(arg, &num_suites); 740 if (suites == NULL) { 857 if (suites == NULL) { 867 suites = xmalloc(num_suites * sizeof *suites); [all...] |
H A D | server.c | 261 " -cs names set list of supported cipher suites (comma-separated)\n"); 267 " -serverpref enforce server's preferences for cipher suites\n"); 361 fprintf(stderr, " Compatible cipher suites:\n"); 636 cipher_suite *suites; local 666 suites = NULL; 866 if (suites != NULL) { 868 " of cipher suites\n"); 872 suites = parse_suites(arg, &num_suites); 873 if (suites == NULL) { 930 if (suites [all...] |
H A D | twrch.c | 83 " -cs names set list of supported cipher suites (comma-separated)\n"); 89 " -serverpref enforce server's preferences for cipher suites\n"); 247 cipher_suite *suites; local 282 suites = NULL; 475 if (suites != NULL) { 477 " of cipher suites\n"); 481 suites = parse_suites(arg, &num_suites); 482 if (suites == NULL) { 602 if (suites == NULL) { 612 suites [all...] |
H A D | names.c | 663 printf("Cipher suites:\n"); 950 VECTOR(cipher_suite) suites = VEC_INIT; 973 VEC_ADD(suites, cipher_suites[u]); 978 if (VEC_LEN(suites) == 0) { 981 r = VEC_TOARRAY(suites); 982 *num = VEC_LEN(suites); 983 VEC_CLEAR(suites);
|
/freebsd-13-stable/contrib/kyua/store/ |
H A D | schema_v3.sql | 89 -- Test suites.
|
H A D | schema_v1.sql | 110 -- Test suites.
|
H A D | schema_v2.sql | 112 -- Test suites.
|
/freebsd-13-stable/contrib/bearssl/inc/ |
H A D | bearssl_ssl.h | 49 * The `BR_TLS_*` constants correspond to the standard cipher suites and 825 * Maximum number of cipher suites supported by a client or server. 956 * Supported minimum and maximum versions, and cipher suites. 1258 * \brief Set the list of cipher suites advertised by this context. 1261 * responsibility to ensure that all provided suites will be supported 1263 * suites supported by the implementation. The provided array MUST NOT 1273 * \param suites cipher suites. 1274 * \param suites_num number of cipher suites. 1277 const uint16_t *suites, size_ [all...] |