/macosx-10.9.5/OpenSSH-186/openssh/regress/ |
H A D | try-ciphers.sh | 1 # $OpenBSD: try-ciphers.sh,v 1.19 2013/02/11 23:58:51 djm Exp $ 4 tid="try ciphers" 6 ciphers="aes128-cbc 3des-cbc blowfish-cbc cast128-cbc 11 ciphers="$ciphers aes128-gcm@openssh.com aes256-gcm@openssh.com" 22 for c in $ciphers; do 39 ciphers="3des blowfish" 40 for c in $ciphers; do
|
H A D | cipher-speed.sh | 14 ciphers="aes128-cbc 3des-cbc blowfish-cbc cast128-cbc 19 ciphers="$ciphers aes128-gcm@openssh.com aes256-gcm@openssh.com" 25 for c in $ciphers; do n=0; for m in $macs; do 45 ciphers="3des blowfish" 46 for c in $ciphers; do
|
H A D | ssh-com.sh | 90 ciphers="3des-cbc blowfish-cbc arcfour" 94 ciphers="$ciphers cast128-cbc" 98 ciphers="$ciphers aes128-cbc cast128-cbc" 102 #ciphers="3des-cbc" 104 for c in $ciphers; do
|
H A D | Makefile | 31 try-ciphers \ 70 INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
|
/macosx-10.9.5/ruby-104/ruby/sample/openssl/ |
H A D | cipher.rb | 31 def ciphers method 32 ciphers = OpenSSL::Cipher.ciphers.sort 33 ciphers.each{|i| 34 if i.upcase != i && ciphers.include?(i.upcase) 35 ciphers.delete(i) 38 return ciphers 41 puts "Supported ciphers in #{OpenSSL::OPENSSL_VERSION}:" 42 ciphers.each_with_index{|name, i| 49 alg = ARGV.shift || ciphers [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/ |
H A D | ssl-46-SSLGetSupportedCiphers.c | 24 SSLCipherSuite *ciphers = NULL; local 29 ciphers = (SSLCipherSuite *) malloc(size); 31 require_string(ciphers, out, "out of memory"); 32 memset(ciphers, 0xff, size); 35 require_noerr(SSLGetSupportedCiphers(ssl, ciphers, &num_ciphers), out); 39 require(ciphers[i]!=(SSLCipherSuite)(-1), out); 46 if(ciphers) free(ciphers); 67 /* Export and Simple DES ciphers */ 89 /* Null ciphers 222 SSLCipherSuite *ciphers = NULL; local 262 SSLCipherSuite ciphers[] = { local [all...] |
H A D | ssl-43-ciphers.c | 2 // ssl-43-ciphers.c 50 Below are all the ciphers that are individually tested. The first element 52 can be looked up in ciphers(1). 111 const CipherSuiteName ciphers[] = { variable 131 /* DHE_RSA ciphers suites */ 252 static int ciphers_len = array_size(ciphers); 259 const CipherSuiteName *a = ciphers; 269 const CipherSuiteName *a = ciphers; 637 for (i=0; ciphers[i].name != NULL; i++) { 646 skip("This ciphersuite is not supported for this protocol version", 2, ciphers[ [all...] |
H A D | ssl-42-ciphers.c | 40 Below are all the ciphers that are individually tested. The first element 42 can be looked up in ciphers(1). 80 static const CipherSuiteName ciphers[] = { variable 138 /* Export ciphers are disabled */ 153 static int ciphers_len = array_size(ciphers); 163 const CipherSuiteName *a = ciphers; 173 const CipherSuiteName *a = ciphers; 564 for (i=0; ciphers[i].cipher != (SSLCipherSuite)(-1); i++) 582 client_side_auth, ciphers[i].dh_anonymous, d, 585 client_side_auth, ciphers[ [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | securetransport++.h | 51 void supportedCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; 54 void enabledCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; // get 55 void enabledCiphers(SSLCipherSuite *ciphers, size_t numCiphers); // set
|
H A D | sslCipherSpecs.c | 258 * Also determines if any ECDSA/ECDH ciphers are enabled; we need to know 313 * Trim out inappropriate ciphers: 314 * -- trim anonymous ciphers if !ctx->anonCipherEnable 315 * -- trim ECDSA ciphers for server side if appropriate 316 * -- trim ECDSA ciphers if TLSv1 disable or SSLv2 enabled (since 317 * we MUST do the Client Hello extensions to make these ciphers 319 * -- trim Stream ciphers if DTLSv1 enable 348 /* First skip ECDSA ciphers as appropriate */ 368 /* trim out the anonymous (and null-auth-cipher) ciphers */ 475 SSLCipherSuite *ciphers, /* RETURNE 472 cipherSuitesToCipherSuites( size_t numCipherSuites, const SSLCipherSuite *cipherSuites, SSLCipherSuite *ciphers, size_t *numCiphers) argument 508 SSLGetSupportedCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument 528 SSLSetEnabledCiphers(SSLContextRef ctx, const SSLCipherSuite *ciphers, size_t numCiphers) argument 603 SSLGetEnabledCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument [all...] |
H A D | securetransport++.cpp | 195 SSLCipherSuite *ciphers, 198 MacOSError::check(SSLGetSupportedCiphers(mContext, ciphers, &numCiphers)); 209 SSLCipherSuite *ciphers, 212 MacOSError::check(SSLGetEnabledCiphers(mContext, ciphers, &numCiphers)); 216 SSLCipherSuite *ciphers, 219 MacOSError::check(SSLSetEnabledCiphers(mContext, ciphers, numCiphers)); 194 supportedCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument 208 enabledCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument 215 enabledCiphers( SSLCipherSuite *ciphers, size_t numCiphers) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | securetransport++.h | 51 void supportedCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; 54 void enabledCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; // get 55 void enabledCiphers(SSLCipherSuite *ciphers, size_t numCiphers); // set
|
H A D | sslCipherSpecs.c | 258 * Also determines if any ECDSA/ECDH ciphers are enabled; we need to know 313 * Trim out inappropriate ciphers: 314 * -- trim anonymous ciphers if !ctx->anonCipherEnable 315 * -- trim ECDSA ciphers for server side if appropriate 316 * -- trim ECDSA ciphers if TLSv1 disable or SSLv2 enabled (since 317 * we MUST do the Client Hello extensions to make these ciphers 319 * -- trim Stream ciphers if DTLSv1 enable 348 /* First skip ECDSA ciphers as appropriate */ 368 /* trim out the anonymous (and null-auth-cipher) ciphers */ 475 SSLCipherSuite *ciphers, /* RETURNE 472 cipherSuitesToCipherSuites( size_t numCipherSuites, const SSLCipherSuite *cipherSuites, SSLCipherSuite *ciphers, size_t *numCiphers) argument 508 SSLGetSupportedCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument 528 SSLSetEnabledCiphers(SSLContextRef ctx, const SSLCipherSuite *ciphers, size_t numCiphers) argument 603 SSLGetEnabledCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument [all...] |
H A D | securetransport++.cpp | 195 SSLCipherSuite *ciphers, 198 MacOSError::check(SSLGetSupportedCiphers(mContext, ciphers, &numCiphers)); 209 SSLCipherSuite *ciphers, 212 MacOSError::check(SSLGetEnabledCiphers(mContext, ciphers, &numCiphers)); 216 SSLCipherSuite *ciphers, 219 MacOSError::check(SSLSetEnabledCiphers(mContext, ciphers, numCiphers)); 194 supportedCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument 208 enabledCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument 215 enabledCiphers( SSLCipherSuite *ciphers, size_t numCiphers) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | securetransport++.h | 51 void supportedCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; 54 void enabledCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; // get 55 void enabledCiphers(SSLCipherSuite *ciphers, size_t numCiphers); // set
|
H A D | sslCipherSpecs.c | 258 * Also determines if any ECDSA/ECDH ciphers are enabled; we need to know 313 * Trim out inappropriate ciphers: 314 * -- trim anonymous ciphers if !ctx->anonCipherEnable 315 * -- trim ECDSA ciphers for server side if appropriate 316 * -- trim ECDSA ciphers if TLSv1 disable or SSLv2 enabled (since 317 * we MUST do the Client Hello extensions to make these ciphers 319 * -- trim Stream ciphers if DTLSv1 enable 348 /* First skip ECDSA ciphers as appropriate */ 368 /* trim out the anonymous (and null-auth-cipher) ciphers */ 475 SSLCipherSuite *ciphers, /* RETURNE 472 cipherSuitesToCipherSuites( size_t numCipherSuites, const SSLCipherSuite *cipherSuites, SSLCipherSuite *ciphers, size_t *numCiphers) argument 508 SSLGetSupportedCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument 528 SSLSetEnabledCiphers(SSLContextRef ctx, const SSLCipherSuite *ciphers, size_t numCiphers) argument 603 SSLGetEnabledCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument [all...] |
H A D | securetransport++.cpp | 195 SSLCipherSuite *ciphers, 198 MacOSError::check(SSLGetSupportedCiphers(mContext, ciphers, &numCiphers)); 209 SSLCipherSuite *ciphers, 212 MacOSError::check(SSLGetEnabledCiphers(mContext, ciphers, &numCiphers)); 216 SSLCipherSuite *ciphers, 219 MacOSError::check(SSLSetEnabledCiphers(mContext, ciphers, numCiphers)); 194 supportedCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument 208 enabledCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument 215 enabledCiphers( SSLCipherSuite *ciphers, size_t numCiphers) argument
|
/macosx-10.9.5/ruby-104/ruby/test/openssl/ |
H A D | test_pair.rb | 13 ctx.ciphers = "ADH" 23 ctx.ciphers = "ADH" 193 ctx.ciphers = "ADH" 221 ctx.ciphers = "ADH"
|
H A D | test_cipher.rb | 10 ciphers = OpenSSL::Cipher.ciphers 11 # redefine method so we can use the cached ciphers value from the closure 14 ciphers.include?(name) 105 OpenSSL::Cipher.ciphers.each{|name|
|
/macosx-10.9.5/Security-55471.14.18/tlsnke/tlsnketest/ |
H A D | st_test.c | 54 Below are all the ciphers that are individually tested. The first element 56 can be looked up in ciphers(1). 94 static const CipherSuiteName ciphers[] = { variable 140 /* Export ciphers are disabled */ 160 const CipherSuiteName *a = ciphers; 170 const CipherSuiteName *a = ciphers; 673 for (i=0; ciphers[i].cipher != (SSLCipherSuite)(-1); i++) { 695 client_side_auth, ciphers[i].dh_anonymous, d, 698 client_side_auth, ciphers[i].dh_anonymous, d, 705 require_noerr(SSLSetEnabledCiphers(client->st, &ciphers[ [all...] |
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | readconf.h | 82 char *ciphers; /* SSH2 ciphers in order of preference. */ member in struct:__anon3331
|
H A D | cipher.c | 72 } ciphers[] = { variable in typeref:struct:Cipher 157 for (c = ciphers; c->name != NULL; c++) 167 for (c = ciphers; c->name != NULL; c++) 195 debug3("ciphers ok: [%s]", names); 211 for (c = ciphers; c->name != NULL; c++)
|
H A D | servconf.h | 88 char *ciphers; /* Supported SSH2 ciphers. */ member in struct:__anon3339
|
/macosx-10.9.5/tcl-102/tcl_ext/tls/tls/ |
H A D | tls.c | 67 char *cert, char *CAdir, char *CAfile, char *ciphers)); 452 * CiphersObjCmd -- list available ciphers 454 * This procedure is invoked to process the "tls::ciphers" command 455 * to list available ciphers, based upon protocol selected. 679 char *ciphers = NULL; 726 OPTSTR( "-cipher", ciphers); 754 if (ciphers && !*ciphers) ciphers = NULL; 807 if ((ctx = CTX_Init(statePtr, proto, key, cert, CAdir, CAfile, ciphers)) 672 char *ciphers = NULL; local 1118 char *channelName, *ciphers; local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/sslViewer/ |
H A D | sslAppUtils.h | 103 const SSLCipherSuite *ciphers);
|