Searched refs:suites (Results 1 - 22 of 22) sorted by relevance

/freebsd-13-stable/contrib/bearssl/src/ssl/
H A Dssl_server_mine2c.c33 static const uint16_t suites[] = { local
44 * Set suites and elliptic curve implementation (for ECDHE).
46 br_ssl_engine_set_suites(&cc->eng, suites,
47 (sizeof suites) / (sizeof suites[0]));
H A Dssl_server_mine2g.c33 static const uint16_t suites[] = { local
44 * Set suites and elliptic curve implementation (for ECDHE).
46 br_ssl_engine_set_suites(&cc->eng, suites,
47 (sizeof suites) / (sizeof suites[0]));
H A Dssl_server_minf2c.c33 static const uint16_t suites[] = { local
44 * Set suites and elliptic curve implementation (for ECDHE).
46 br_ssl_engine_set_suites(&cc->eng, suites,
47 (sizeof suites) / (sizeof suites[0]));
H A Dssl_server_minf2g.c33 static const uint16_t suites[] = { local
44 * Set suites and elliptic curve implementation (for ECDHE).
46 br_ssl_engine_set_suites(&cc->eng, suites,
47 (sizeof suites) / (sizeof suites[0]));
H A Dssl_server_minr2g.c33 static const uint16_t suites[] = { local
44 * Set suites.
46 br_ssl_engine_set_suites(&cc->eng, suites,
47 (sizeof suites) / (sizeof suites[0]));
H A Dssl_server_minu2g.c33 static const uint16_t suites[] = { local
44 * Set suites.
46 br_ssl_engine_set_suites(&cc->eng, suites,
47 (sizeof suites) / (sizeof suites[0]));
H A Dssl_server_minv2g.c33 static const uint16_t suites[] = { local
44 * Set suites.
46 br_ssl_engine_set_suites(&cc->eng, suites,
47 (sizeof suites) / (sizeof suites[0]));
H A Dssl_server_full_ec.c34 * The "full" profile supports all implemented cipher suites.
47 * Note that for ECDH suites, the list will be automatically
50 static const uint16_t suites[] = { local
103 * Set suites and elliptic curve implementation (for ECDHE).
105 br_ssl_engine_set_suites(&cc->eng, suites,
106 (sizeof suites) / (sizeof suites[0]));
H A Dssl_server_full_rsa.c34 * The "full" profile supports all implemented cipher suites.
46 static const uint16_t suites[] = { local
92 * Set suites and elliptic curve implementation (for ECDHE).
94 br_ssl_engine_set_suites(&cc->eng, suites,
95 (sizeof suites) / (sizeof suites[0]));
H A Dssl_client_full.c34 * The "full" profile supports all implemented cipher suites.
52 static const uint16_t suites[] = { local
131 * Set suites and asymmetric crypto implementations. We use the
136 br_ssl_engine_set_suites(&cc->eng, suites,
137 (sizeof suites) / (sizeof suites[0]));
H A Dssl_engine.c1021 const uint16_t *suites, size_t suites_num)
1023 if ((suites_num * sizeof *suites) > sizeof cc->suites_buf) {
1027 memcpy(cc->suites_buf, suites, suites_num * sizeof *suites);
1020 br_ssl_engine_set_suites(br_ssl_engine_context *cc, const uint16_t *suites, size_t suites_num) argument
/freebsd-13-stable/contrib/bearssl/samples/
H A Dcustom_profile.c29 * configures a list of cipher suites and algorithm implementations.
38 * supported (protocol versions and cipher suites).
51 * A list of cipher suites, by preference (first is most
52 * preferred). The list below contains all cipher suites supported
55 static const uint16_t suites[] = { local
114 * -- cipher suites with a name ending in "SHA384" need "prf_sha384";
131 * -- With TLS 1.2, cipher suites with a name ending in "SHA384"
133 * -- With TLS 1.2, cipher suites with a name ending in "SHA256"
135 * -- With TLS 1.2, cipher suites with a name ending in "SHA"
140 * cipher suites), an
461 static const uint16_t suites[] = { local
[all...]
/freebsd-13-stable/contrib/wpa/src/tls/
H A Dtlsv1_client.c445 u16 *suites; local
461 suites = conn->cipher_suites;
462 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA256;
463 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA256;
464 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA;
465 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA;
466 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA256;
467 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA256;
468 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA;
469 suites[coun
789 u16 *suites; local
[all...]
H A Dtlsv1_server.c381 u16 *suites; local
399 suites = conn->cipher_suites;
400 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA256;
401 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA256;
402 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA;
403 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA;
404 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA256;
405 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA256;
406 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA;
407 suites[coun
689 u16 *suites; local
[all...]
/freebsd-13-stable/contrib/bearssl/tools/
H A Dclient.c492 " -cs names set list of supported cipher suites (comma-separated)\n");
522 cipher_suite *suites; local
553 suites = NULL;
733 if (suites != NULL) {
735 " of cipher suites\n");
739 suites = parse_suites(arg, &num_suites);
740 if (suites == NULL) {
857 if (suites == NULL) {
867 suites = xmalloc(num_suites * sizeof *suites);
[all...]
H A Dserver.c261 " -cs names set list of supported cipher suites (comma-separated)\n");
267 " -serverpref enforce server's preferences for cipher suites\n");
361 fprintf(stderr, " Compatible cipher suites:\n");
636 cipher_suite *suites; local
666 suites = NULL;
866 if (suites != NULL) {
868 " of cipher suites\n");
872 suites = parse_suites(arg, &num_suites);
873 if (suites == NULL) {
930 if (suites
[all...]
H A Dtwrch.c83 " -cs names set list of supported cipher suites (comma-separated)\n");
89 " -serverpref enforce server's preferences for cipher suites\n");
247 cipher_suite *suites; local
282 suites = NULL;
475 if (suites != NULL) {
477 " of cipher suites\n");
481 suites = parse_suites(arg, &num_suites);
482 if (suites == NULL) {
602 if (suites == NULL) {
612 suites
[all...]
H A Dnames.c663 printf("Cipher suites:\n");
950 VECTOR(cipher_suite) suites = VEC_INIT;
973 VEC_ADD(suites, cipher_suites[u]);
978 if (VEC_LEN(suites) == 0) {
981 r = VEC_TOARRAY(suites);
982 *num = VEC_LEN(suites);
983 VEC_CLEAR(suites);
/freebsd-13-stable/contrib/kyua/store/
H A Dschema_v3.sql89 -- Test suites.
H A Dschema_v1.sql110 -- Test suites.
H A Dschema_v2.sql112 -- Test suites.
/freebsd-13-stable/contrib/bearssl/inc/
H A Dbearssl_ssl.h49 * The `BR_TLS_*` constants correspond to the standard cipher suites and
825 * Maximum number of cipher suites supported by a client or server.
956 * Supported minimum and maximum versions, and cipher suites.
1258 * \brief Set the list of cipher suites advertised by this context.
1261 * responsibility to ensure that all provided suites will be supported
1263 * suites supported by the implementation. The provided array MUST NOT
1273 * \param suites cipher suites.
1274 * \param suites_num number of cipher suites.
1277 const uint16_t *suites, size_
[all...]

Completed in 97 milliseconds