Searched refs:ciphers (Results 1 - 25 of 89) sorted by relevance

1234

/macosx-10.10/OpenSSH-189/openssh/regress/
H A Dtry-ciphers.sh1 # $OpenBSD: try-ciphers.sh,v 1.19 2013/02/11 23:58:51 djm Exp $
4 tid="try ciphers"
6 ciphers="aes128-cbc 3des-cbc blowfish-cbc cast128-cbc
11 ciphers="$ciphers aes128-gcm@openssh.com aes256-gcm@openssh.com"
22 for c in $ciphers; do
39 ciphers="3des blowfish"
40 for c in $ciphers; do
H A Dcipher-speed.sh14 ciphers="aes128-cbc 3des-cbc blowfish-cbc cast128-cbc
19 ciphers="$ciphers aes128-gcm@openssh.com aes256-gcm@openssh.com"
25 for c in $ciphers; do n=0; for m in $macs; do
45 ciphers="3des blowfish"
46 for c in $ciphers; do
H A Dssh-com.sh90 ciphers="3des-cbc blowfish-cbc arcfour"
94 ciphers="$ciphers cast128-cbc"
98 ciphers="$ciphers aes128-cbc cast128-cbc"
102 #ciphers="3des-cbc"
104 for c in $ciphers; do
/macosx-10.10/ruby-106/ruby/sample/openssl/
H A Dcipher.rb31 def ciphers method
32 ciphers = OpenSSL::Cipher.ciphers.sort
33 ciphers.each{|i|
34 if i.upcase != i && ciphers.include?(i.upcase)
35 ciphers.delete(i)
38 return ciphers
41 puts "Supported ciphers in #{OpenSSL::OPENSSL_VERSION}:"
42 ciphers.each_with_index{|name, i|
49 alg = ARGV.shift || ciphers
[all...]
/macosx-10.10/OpenSSL098-52/src/crypto/engine/
H A Dtb_cipher.c76 if(e->ciphers)
79 int num_nids = e->ciphers(e, NULL, &nids, 0);
98 if(e->ciphers)
101 int num_nids = e->ciphers(e, NULL, &nids, 0);
135 return e->ciphers;
141 e->ciphers = f;
H A Deng_cryptodev.c136 } ciphers[] = { variable in typeref:struct:__anon3293
220 for (i = 0; ciphers[i].id; i++)
221 if (ciphers[i].id == cipher)
222 return (ciphers[i].ivmax);
237 for (i = 0; ciphers[i].id; i++)
238 if (ciphers[i].id == cipher)
239 return (ciphers[i].keylen == len);
249 for (i = 0; ciphers[i].id; i++)
250 if (ciphers[i].nid == nid)
251 return (ciphers[
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/regressions/
H A Dssl-46-SSLGetSupportedCiphers.c40 SSLCipherSuite *ciphers = NULL; local
45 ciphers = (SSLCipherSuite *) malloc(size);
47 require_string(ciphers, out, "out of memory");
48 memset(ciphers, 0xff, size);
51 require_noerr(SSLGetSupportedCiphers(ssl, ciphers, &num_ciphers), out);
55 require(ciphers[i]!=(SSLCipherSuite)(-1), out);
62 if(ciphers) free(ciphers);
83 /* Export and Simple DES ciphers */
105 /* Null ciphers
238 SSLCipherSuite *ciphers = NULL; local
278 SSLCipherSuite ciphers[] = { local
[all...]
H A Dssl-43-ciphers.c66 Below are all the ciphers that are individually tested. The first element
68 can be looked up in ciphers(1).
128 const CipherSuiteName ciphers[] = { variable
148 /* DHE_RSA ciphers suites */
269 static int ciphers_len = array_size(ciphers);
276 const CipherSuiteName *a = ciphers;
286 const CipherSuiteName *a = ciphers;
654 for (i=0; ciphers[i].name != NULL; i++) {
663 skip("This ciphersuite is not supported for this protocol version", 2, ciphers[i].prot<=pr);
664 skip("This server doesn't support this ciphersuite", 2, ciphers[
[all...]
H A Dssl-42-ciphers.c40 Below are all the ciphers that are individually tested. The first element
42 can be looked up in ciphers(1).
81 static const CipherSuiteName ciphers[] = { variable
111 // Put all the RC4 ciphers at the end: no DTLS for them.
147 static int ciphers_len = array_size(ciphers);
157 const CipherSuiteName *a = ciphers;
167 const CipherSuiteName *a = ciphers;
602 for (i=0; ciphers[i].cipher != (SSLCipherSuite)(-1); i++)
606 skip("This ciphersuite is not supported for DTLS", 1, !d || ciphers[i].dtls);
620 client_side_auth, ciphers[
[all...]
H A Dssl-49-sni.c171 static uint16_t ciphers[] = { variable
176 static int nciphers = sizeof(ciphers)/sizeof(ciphers[0]);
203 tls_handshake_set_ciphersuites(handle->hdsk, ciphers, nciphers);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/
H A DsslCipherSpecs.c186 * Trim out inappropriate ciphers:
187 * -- trim anonymous ciphers if !ctx->anonCipherEnable
188 * -- trim ECDSA ciphers for server side if appropriate
189 * -- trim ECDSA ciphers if TLSv1 disable or SSLv2 enabled (since
190 * we MUST do the Client Hello extensions to make these ciphers
192 * -- trim Stream ciphers if DTLSv1 enable
193 * -- trim CBC ciphers when doing SSLv3 fallback
227 /* First skip ECDSA ciphers as appropriate */
247 /* trim out the anonymous (and null-auth-cipher) ciphers */
372 SSLCipherSuite *ciphers, /* RETURNE
369 cipherSuitesToCipherSuites( size_t numCipherSuites, const uint16_t *cipherSuites, SSLCipherSuite *ciphers, size_t *numCiphers) argument
411 SSLGetSupportedCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument
431 SSLSetEnabledCiphers(SSLContextRef ctx, const SSLCipherSuite *ciphers, size_t numCiphers) argument
508 SSLGetEnabledCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument
[all...]
H A Dsecuretransport++.h51 void supportedCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const;
54 void enabledCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; // get
55 void enabledCiphers(SSLCipherSuite *ciphers, size_t numCiphers); // set
H A Dsecuretransport++.cpp195 SSLCipherSuite *ciphers,
198 MacOSError::check(SSLGetSupportedCiphers(mContext, ciphers, &numCiphers));
209 SSLCipherSuite *ciphers,
212 MacOSError::check(SSLGetEnabledCiphers(mContext, ciphers, &numCiphers));
216 SSLCipherSuite *ciphers,
219 MacOSError::check(SSLSetEnabledCiphers(mContext, ciphers, numCiphers));
194 supportedCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument
208 enabledCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument
215 enabledCiphers( SSLCipherSuite *ciphers, size_t numCiphers) argument
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/
H A DsslCipherSpecs.c186 * Trim out inappropriate ciphers:
187 * -- trim anonymous ciphers if !ctx->anonCipherEnable
188 * -- trim ECDSA ciphers for server side if appropriate
189 * -- trim ECDSA ciphers if TLSv1 disable or SSLv2 enabled (since
190 * we MUST do the Client Hello extensions to make these ciphers
192 * -- trim Stream ciphers if DTLSv1 enable
193 * -- trim CBC ciphers when doing SSLv3 fallback
227 /* First skip ECDSA ciphers as appropriate */
247 /* trim out the anonymous (and null-auth-cipher) ciphers */
372 SSLCipherSuite *ciphers, /* RETURNE
369 cipherSuitesToCipherSuites( size_t numCipherSuites, const uint16_t *cipherSuites, SSLCipherSuite *ciphers, size_t *numCiphers) argument
411 SSLGetSupportedCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument
431 SSLSetEnabledCiphers(SSLContextRef ctx, const SSLCipherSuite *ciphers, size_t numCiphers) argument
508 SSLGetEnabledCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument
[all...]
H A Dsecuretransport++.h51 void supportedCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const;
54 void enabledCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; // get
55 void enabledCiphers(SSLCipherSuite *ciphers, size_t numCiphers); // set
H A Dsecuretransport++.cpp195 SSLCipherSuite *ciphers,
198 MacOSError::check(SSLGetSupportedCiphers(mContext, ciphers, &numCiphers));
209 SSLCipherSuite *ciphers,
212 MacOSError::check(SSLGetEnabledCiphers(mContext, ciphers, &numCiphers));
216 SSLCipherSuite *ciphers,
219 MacOSError::check(SSLSetEnabledCiphers(mContext, ciphers, numCiphers));
194 supportedCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument
208 enabledCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument
215 enabledCiphers( SSLCipherSuite *ciphers, size_t numCiphers) argument
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/
H A DsslCipherSpecs.c186 * Trim out inappropriate ciphers:
187 * -- trim anonymous ciphers if !ctx->anonCipherEnable
188 * -- trim ECDSA ciphers for server side if appropriate
189 * -- trim ECDSA ciphers if TLSv1 disable or SSLv2 enabled (since
190 * we MUST do the Client Hello extensions to make these ciphers
192 * -- trim Stream ciphers if DTLSv1 enable
193 * -- trim CBC ciphers when doing SSLv3 fallback
227 /* First skip ECDSA ciphers as appropriate */
247 /* trim out the anonymous (and null-auth-cipher) ciphers */
372 SSLCipherSuite *ciphers, /* RETURNE
369 cipherSuitesToCipherSuites( size_t numCipherSuites, const uint16_t *cipherSuites, SSLCipherSuite *ciphers, size_t *numCiphers) argument
411 SSLGetSupportedCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument
431 SSLSetEnabledCiphers(SSLContextRef ctx, const SSLCipherSuite *ciphers, size_t numCiphers) argument
508 SSLGetEnabledCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument
[all...]
H A Dsecuretransport++.h51 void supportedCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const;
54 void enabledCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; // get
55 void enabledCiphers(SSLCipherSuite *ciphers, size_t numCiphers); // set
H A Dsecuretransport++.cpp195 SSLCipherSuite *ciphers,
198 MacOSError::check(SSLGetSupportedCiphers(mContext, ciphers, &numCiphers));
209 SSLCipherSuite *ciphers,
212 MacOSError::check(SSLGetEnabledCiphers(mContext, ciphers, &numCiphers));
216 SSLCipherSuite *ciphers,
219 MacOSError::check(SSLSetEnabledCiphers(mContext, ciphers, numCiphers));
194 supportedCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument
208 enabledCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument
215 enabledCiphers( SSLCipherSuite *ciphers, size_t numCiphers) argument
/macosx-10.10/OpenSSL098-52/src/apps/
H A Dciphers.c1 /* apps/ciphers.c */
73 "usage: ciphers args\n",
74 " -v - verbose mode, a textual listing of the ciphers in SSLeay\n",
92 char *ciphers=NULL; local
144 ciphers= *argv;
161 if (ciphers != NULL) {
162 if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
H A Dprogs.pl30 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/sslSession/
H A DsslSession.cpp61 static SSLCipherSuite ciphers[] = { variable
86 ciphers, // ciphers
127 NULL, // ciphers
185 ciphers[0] = SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA;
189 ciphers[0] = SSL_DH_anon_WITH_RC4_128_MD5;
/macosx-10.10/curl-83.1.2/curl/lib/vtls/
H A Dgskit.c100 /* Supported ciphers. */
305 } ciphers[CURL_GSKPROTO_LAST]; local
320 memset((char *) ciphers, 0, sizeof ciphers);
322 ciphers[i].buf = malloc(l);
323 if(!ciphers[i].buf) {
325 free(ciphers[i].buf);
328 ciphers[i].ptr = ciphers[i].buf;
329 *ciphers[
[all...]
/macosx-10.10/ruby-106/ruby/test/openssl/
H A Dtest_pair.rb13 ctx.ciphers = "ADH"
23 ctx.ciphers = "ADH"
193 ctx.ciphers = "ADH"
221 ctx.ciphers = "ADH"
/macosx-10.10/Security-57031.1.35/Security/tlsnke/tlsnketest/
H A Dst_test.c70 Below are all the ciphers that are individually tested. The first element
72 can be looked up in ciphers(1).
110 static const CipherSuiteName ciphers[] = { variable
156 /* Export ciphers are disabled */
176 const CipherSuiteName *a = ciphers;
186 const CipherSuiteName *a = ciphers;
689 for (i=0; ciphers[i].cipher != (SSLCipherSuite)(-1); i++) {
711 client_side_auth, ciphers[i].dh_anonymous, d,
714 client_side_auth, ciphers[i].dh_anonymous, d,
721 require_noerr(SSLSetEnabledCiphers(client->st, &ciphers[
[all...]

Completed in 278 milliseconds

1234