/macosx-10.10/OpenSSH-189/openssh/regress/ |
H A D | try-ciphers.sh | 1 # $OpenBSD: try-ciphers.sh,v 1.19 2013/02/11 23:58:51 djm Exp $ 4 tid="try ciphers" 6 ciphers="aes128-cbc 3des-cbc blowfish-cbc cast128-cbc 11 ciphers="$ciphers aes128-gcm@openssh.com aes256-gcm@openssh.com" 22 for c in $ciphers; do 39 ciphers="3des blowfish" 40 for c in $ciphers; do
|
H A D | cipher-speed.sh | 14 ciphers="aes128-cbc 3des-cbc blowfish-cbc cast128-cbc 19 ciphers="$ciphers aes128-gcm@openssh.com aes256-gcm@openssh.com" 25 for c in $ciphers; do n=0; for m in $macs; do 45 ciphers="3des blowfish" 46 for c in $ciphers; do
|
H A D | ssh-com.sh | 90 ciphers="3des-cbc blowfish-cbc arcfour" 94 ciphers="$ciphers cast128-cbc" 98 ciphers="$ciphers aes128-cbc cast128-cbc" 102 #ciphers="3des-cbc" 104 for c in $ciphers; do
|
/macosx-10.10/ruby-106/ruby/sample/openssl/ |
H A D | cipher.rb | 31 def ciphers method 32 ciphers = OpenSSL::Cipher.ciphers.sort 33 ciphers.each{|i| 34 if i.upcase != i && ciphers.include?(i.upcase) 35 ciphers.delete(i) 38 return ciphers 41 puts "Supported ciphers in #{OpenSSL::OPENSSL_VERSION}:" 42 ciphers.each_with_index{|name, i| 49 alg = ARGV.shift || ciphers [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/engine/ |
H A D | tb_cipher.c | 76 if(e->ciphers) 79 int num_nids = e->ciphers(e, NULL, &nids, 0); 98 if(e->ciphers) 101 int num_nids = e->ciphers(e, NULL, &nids, 0); 135 return e->ciphers; 141 e->ciphers = f;
|
H A D | eng_cryptodev.c | 136 } ciphers[] = { variable in typeref:struct:__anon3293 220 for (i = 0; ciphers[i].id; i++) 221 if (ciphers[i].id == cipher) 222 return (ciphers[i].ivmax); 237 for (i = 0; ciphers[i].id; i++) 238 if (ciphers[i].id == cipher) 239 return (ciphers[i].keylen == len); 249 for (i = 0; ciphers[i].id; i++) 250 if (ciphers[i].nid == nid) 251 return (ciphers[ [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/regressions/ |
H A D | ssl-46-SSLGetSupportedCiphers.c | 40 SSLCipherSuite *ciphers = NULL; local 45 ciphers = (SSLCipherSuite *) malloc(size); 47 require_string(ciphers, out, "out of memory"); 48 memset(ciphers, 0xff, size); 51 require_noerr(SSLGetSupportedCiphers(ssl, ciphers, &num_ciphers), out); 55 require(ciphers[i]!=(SSLCipherSuite)(-1), out); 62 if(ciphers) free(ciphers); 83 /* Export and Simple DES ciphers */ 105 /* Null ciphers 238 SSLCipherSuite *ciphers = NULL; local 278 SSLCipherSuite ciphers[] = { local [all...] |
H A D | ssl-43-ciphers.c | 66 Below are all the ciphers that are individually tested. The first element 68 can be looked up in ciphers(1). 128 const CipherSuiteName ciphers[] = { variable 148 /* DHE_RSA ciphers suites */ 269 static int ciphers_len = array_size(ciphers); 276 const CipherSuiteName *a = ciphers; 286 const CipherSuiteName *a = ciphers; 654 for (i=0; ciphers[i].name != NULL; i++) { 663 skip("This ciphersuite is not supported for this protocol version", 2, ciphers[i].prot<=pr); 664 skip("This server doesn't support this ciphersuite", 2, ciphers[ [all...] |
H A D | ssl-42-ciphers.c | 40 Below are all the ciphers that are individually tested. The first element 42 can be looked up in ciphers(1). 81 static const CipherSuiteName ciphers[] = { variable 111 // Put all the RC4 ciphers at the end: no DTLS for them. 147 static int ciphers_len = array_size(ciphers); 157 const CipherSuiteName *a = ciphers; 167 const CipherSuiteName *a = ciphers; 602 for (i=0; ciphers[i].cipher != (SSLCipherSuite)(-1); i++) 606 skip("This ciphersuite is not supported for DTLS", 1, !d || ciphers[i].dtls); 620 client_side_auth, ciphers[ [all...] |
H A D | ssl-49-sni.c | 171 static uint16_t ciphers[] = { variable 176 static int nciphers = sizeof(ciphers)/sizeof(ciphers[0]); 203 tls_handshake_set_ciphersuites(handle->hdsk, ciphers, nciphers);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | sslCipherSpecs.c | 186 * Trim out inappropriate ciphers: 187 * -- trim anonymous ciphers if !ctx->anonCipherEnable 188 * -- trim ECDSA ciphers for server side if appropriate 189 * -- trim ECDSA ciphers if TLSv1 disable or SSLv2 enabled (since 190 * we MUST do the Client Hello extensions to make these ciphers 192 * -- trim Stream ciphers if DTLSv1 enable 193 * -- trim CBC ciphers when doing SSLv3 fallback 227 /* First skip ECDSA ciphers as appropriate */ 247 /* trim out the anonymous (and null-auth-cipher) ciphers */ 372 SSLCipherSuite *ciphers, /* RETURNE 369 cipherSuitesToCipherSuites( size_t numCipherSuites, const uint16_t *cipherSuites, SSLCipherSuite *ciphers, size_t *numCiphers) argument 411 SSLGetSupportedCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument 431 SSLSetEnabledCiphers(SSLContextRef ctx, const SSLCipherSuite *ciphers, size_t numCiphers) argument 508 SSLGetEnabledCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument [all...] |
H A D | securetransport++.h | 51 void supportedCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; 54 void enabledCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; // get 55 void enabledCiphers(SSLCipherSuite *ciphers, size_t numCiphers); // set
|
H A D | securetransport++.cpp | 195 SSLCipherSuite *ciphers, 198 MacOSError::check(SSLGetSupportedCiphers(mContext, ciphers, &numCiphers)); 209 SSLCipherSuite *ciphers, 212 MacOSError::check(SSLGetEnabledCiphers(mContext, ciphers, &numCiphers)); 216 SSLCipherSuite *ciphers, 219 MacOSError::check(SSLSetEnabledCiphers(mContext, ciphers, numCiphers)); 194 supportedCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument 208 enabledCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument 215 enabledCiphers( SSLCipherSuite *ciphers, size_t numCiphers) argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | sslCipherSpecs.c | 186 * Trim out inappropriate ciphers: 187 * -- trim anonymous ciphers if !ctx->anonCipherEnable 188 * -- trim ECDSA ciphers for server side if appropriate 189 * -- trim ECDSA ciphers if TLSv1 disable or SSLv2 enabled (since 190 * we MUST do the Client Hello extensions to make these ciphers 192 * -- trim Stream ciphers if DTLSv1 enable 193 * -- trim CBC ciphers when doing SSLv3 fallback 227 /* First skip ECDSA ciphers as appropriate */ 247 /* trim out the anonymous (and null-auth-cipher) ciphers */ 372 SSLCipherSuite *ciphers, /* RETURNE 369 cipherSuitesToCipherSuites( size_t numCipherSuites, const uint16_t *cipherSuites, SSLCipherSuite *ciphers, size_t *numCiphers) argument 411 SSLGetSupportedCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument 431 SSLSetEnabledCiphers(SSLContextRef ctx, const SSLCipherSuite *ciphers, size_t numCiphers) argument 508 SSLGetEnabledCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument [all...] |
H A D | securetransport++.h | 51 void supportedCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; 54 void enabledCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; // get 55 void enabledCiphers(SSLCipherSuite *ciphers, size_t numCiphers); // set
|
H A D | securetransport++.cpp | 195 SSLCipherSuite *ciphers, 198 MacOSError::check(SSLGetSupportedCiphers(mContext, ciphers, &numCiphers)); 209 SSLCipherSuite *ciphers, 212 MacOSError::check(SSLGetEnabledCiphers(mContext, ciphers, &numCiphers)); 216 SSLCipherSuite *ciphers, 219 MacOSError::check(SSLSetEnabledCiphers(mContext, ciphers, numCiphers)); 194 supportedCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument 208 enabledCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument 215 enabledCiphers( SSLCipherSuite *ciphers, size_t numCiphers) argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | sslCipherSpecs.c | 186 * Trim out inappropriate ciphers: 187 * -- trim anonymous ciphers if !ctx->anonCipherEnable 188 * -- trim ECDSA ciphers for server side if appropriate 189 * -- trim ECDSA ciphers if TLSv1 disable or SSLv2 enabled (since 190 * we MUST do the Client Hello extensions to make these ciphers 192 * -- trim Stream ciphers if DTLSv1 enable 193 * -- trim CBC ciphers when doing SSLv3 fallback 227 /* First skip ECDSA ciphers as appropriate */ 247 /* trim out the anonymous (and null-auth-cipher) ciphers */ 372 SSLCipherSuite *ciphers, /* RETURNE 369 cipherSuitesToCipherSuites( size_t numCipherSuites, const uint16_t *cipherSuites, SSLCipherSuite *ciphers, size_t *numCiphers) argument 411 SSLGetSupportedCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument 431 SSLSetEnabledCiphers(SSLContextRef ctx, const SSLCipherSuite *ciphers, size_t numCiphers) argument 508 SSLGetEnabledCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument [all...] |
H A D | securetransport++.h | 51 void supportedCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; 54 void enabledCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; // get 55 void enabledCiphers(SSLCipherSuite *ciphers, size_t numCiphers); // set
|
H A D | securetransport++.cpp | 195 SSLCipherSuite *ciphers, 198 MacOSError::check(SSLGetSupportedCiphers(mContext, ciphers, &numCiphers)); 209 SSLCipherSuite *ciphers, 212 MacOSError::check(SSLGetEnabledCiphers(mContext, ciphers, &numCiphers)); 216 SSLCipherSuite *ciphers, 219 MacOSError::check(SSLSetEnabledCiphers(mContext, ciphers, numCiphers)); 194 supportedCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument 208 enabledCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument 215 enabledCiphers( SSLCipherSuite *ciphers, size_t numCiphers) argument
|
/macosx-10.10/OpenSSL098-52/src/apps/ |
H A D | ciphers.c | 1 /* apps/ciphers.c */ 73 "usage: ciphers args\n", 74 " -v - verbose mode, a textual listing of the ciphers in SSLeay\n", 92 char *ciphers=NULL; local 144 ciphers= *argv; 161 if (ciphers != NULL) { 162 if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
|
H A D | progs.pl | 30 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/sslSession/ |
H A D | sslSession.cpp | 61 static SSLCipherSuite ciphers[] = { variable 86 ciphers, // ciphers 127 NULL, // ciphers 185 ciphers[0] = SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA; 189 ciphers[0] = SSL_DH_anon_WITH_RC4_128_MD5;
|
/macosx-10.10/curl-83.1.2/curl/lib/vtls/ |
H A D | gskit.c | 100 /* Supported ciphers. */ 305 } ciphers[CURL_GSKPROTO_LAST]; local 320 memset((char *) ciphers, 0, sizeof ciphers); 322 ciphers[i].buf = malloc(l); 323 if(!ciphers[i].buf) { 325 free(ciphers[i].buf); 328 ciphers[i].ptr = ciphers[i].buf; 329 *ciphers[ [all...] |
/macosx-10.10/ruby-106/ruby/test/openssl/ |
H A D | test_pair.rb | 13 ctx.ciphers = "ADH" 23 ctx.ciphers = "ADH" 193 ctx.ciphers = "ADH" 221 ctx.ciphers = "ADH"
|
/macosx-10.10/Security-57031.1.35/Security/tlsnke/tlsnketest/ |
H A D | st_test.c | 70 Below are all the ciphers that are individually tested. The first element 72 can be looked up in ciphers(1). 110 static const CipherSuiteName ciphers[] = { variable 156 /* Export ciphers are disabled */ 176 const CipherSuiteName *a = ciphers; 186 const CipherSuiteName *a = ciphers; 689 for (i=0; ciphers[i].cipher != (SSLCipherSuite)(-1); i++) { 711 client_side_auth, ciphers[i].dh_anonymous, d, 714 client_side_auth, ciphers[i].dh_anonymous, d, 721 require_noerr(SSLSetEnabledCiphers(client->st, &ciphers[ [all...] |