Searched refs:ciphers (Results 1 - 25 of 51) sorted by relevance

123

/macosx-10.9.5/OpenSSH-186/openssh/regress/
H A Dtry-ciphers.sh1 # $OpenBSD: try-ciphers.sh,v 1.19 2013/02/11 23:58:51 djm Exp $
4 tid="try ciphers"
6 ciphers="aes128-cbc 3des-cbc blowfish-cbc cast128-cbc
11 ciphers="$ciphers aes128-gcm@openssh.com aes256-gcm@openssh.com"
22 for c in $ciphers; do
39 ciphers="3des blowfish"
40 for c in $ciphers; do
H A Dcipher-speed.sh14 ciphers="aes128-cbc 3des-cbc blowfish-cbc cast128-cbc
19 ciphers="$ciphers aes128-gcm@openssh.com aes256-gcm@openssh.com"
25 for c in $ciphers; do n=0; for m in $macs; do
45 ciphers="3des blowfish"
46 for c in $ciphers; do
H A Dssh-com.sh90 ciphers="3des-cbc blowfish-cbc arcfour"
94 ciphers="$ciphers cast128-cbc"
98 ciphers="$ciphers aes128-cbc cast128-cbc"
102 #ciphers="3des-cbc"
104 for c in $ciphers; do
H A DMakefile31 try-ciphers \
70 INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
/macosx-10.9.5/ruby-104/ruby/sample/openssl/
H A Dcipher.rb31 def ciphers method
32 ciphers = OpenSSL::Cipher.ciphers.sort
33 ciphers.each{|i|
34 if i.upcase != i && ciphers.include?(i.upcase)
35 ciphers.delete(i)
38 return ciphers
41 puts "Supported ciphers in #{OpenSSL::OPENSSL_VERSION}:"
42 ciphers.each_with_index{|name, i|
49 alg = ARGV.shift || ciphers
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/
H A Dssl-46-SSLGetSupportedCiphers.c24 SSLCipherSuite *ciphers = NULL; local
29 ciphers = (SSLCipherSuite *) malloc(size);
31 require_string(ciphers, out, "out of memory");
32 memset(ciphers, 0xff, size);
35 require_noerr(SSLGetSupportedCiphers(ssl, ciphers, &num_ciphers), out);
39 require(ciphers[i]!=(SSLCipherSuite)(-1), out);
46 if(ciphers) free(ciphers);
67 /* Export and Simple DES ciphers */
89 /* Null ciphers
222 SSLCipherSuite *ciphers = NULL; local
262 SSLCipherSuite ciphers[] = { local
[all...]
H A Dssl-43-ciphers.c2 // ssl-43-ciphers.c
50 Below are all the ciphers that are individually tested. The first element
52 can be looked up in ciphers(1).
111 const CipherSuiteName ciphers[] = { variable
131 /* DHE_RSA ciphers suites */
252 static int ciphers_len = array_size(ciphers);
259 const CipherSuiteName *a = ciphers;
269 const CipherSuiteName *a = ciphers;
637 for (i=0; ciphers[i].name != NULL; i++) {
646 skip("This ciphersuite is not supported for this protocol version", 2, ciphers[
[all...]
H A Dssl-42-ciphers.c40 Below are all the ciphers that are individually tested. The first element
42 can be looked up in ciphers(1).
80 static const CipherSuiteName ciphers[] = { variable
138 /* Export ciphers are disabled */
153 static int ciphers_len = array_size(ciphers);
163 const CipherSuiteName *a = ciphers;
173 const CipherSuiteName *a = ciphers;
564 for (i=0; ciphers[i].cipher != (SSLCipherSuite)(-1); i++)
582 client_side_auth, ciphers[i].dh_anonymous, d,
585 client_side_auth, ciphers[
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/
H A Dsecuretransport++.h51 void supportedCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const;
54 void enabledCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; // get
55 void enabledCiphers(SSLCipherSuite *ciphers, size_t numCiphers); // set
H A DsslCipherSpecs.c258 * Also determines if any ECDSA/ECDH ciphers are enabled; we need to know
313 * Trim out inappropriate ciphers:
314 * -- trim anonymous ciphers if !ctx->anonCipherEnable
315 * -- trim ECDSA ciphers for server side if appropriate
316 * -- trim ECDSA ciphers if TLSv1 disable or SSLv2 enabled (since
317 * we MUST do the Client Hello extensions to make these ciphers
319 * -- trim Stream ciphers if DTLSv1 enable
348 /* First skip ECDSA ciphers as appropriate */
368 /* trim out the anonymous (and null-auth-cipher) ciphers */
475 SSLCipherSuite *ciphers, /* RETURNE
472 cipherSuitesToCipherSuites( size_t numCipherSuites, const SSLCipherSuite *cipherSuites, SSLCipherSuite *ciphers, size_t *numCiphers) argument
508 SSLGetSupportedCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument
528 SSLSetEnabledCiphers(SSLContextRef ctx, const SSLCipherSuite *ciphers, size_t numCiphers) argument
603 SSLGetEnabledCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument
[all...]
H A Dsecuretransport++.cpp195 SSLCipherSuite *ciphers,
198 MacOSError::check(SSLGetSupportedCiphers(mContext, ciphers, &numCiphers));
209 SSLCipherSuite *ciphers,
212 MacOSError::check(SSLGetEnabledCiphers(mContext, ciphers, &numCiphers));
216 SSLCipherSuite *ciphers,
219 MacOSError::check(SSLSetEnabledCiphers(mContext, ciphers, numCiphers));
194 supportedCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument
208 enabledCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument
215 enabledCiphers( SSLCipherSuite *ciphers, size_t numCiphers) argument
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/
H A Dsecuretransport++.h51 void supportedCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const;
54 void enabledCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; // get
55 void enabledCiphers(SSLCipherSuite *ciphers, size_t numCiphers); // set
H A DsslCipherSpecs.c258 * Also determines if any ECDSA/ECDH ciphers are enabled; we need to know
313 * Trim out inappropriate ciphers:
314 * -- trim anonymous ciphers if !ctx->anonCipherEnable
315 * -- trim ECDSA ciphers for server side if appropriate
316 * -- trim ECDSA ciphers if TLSv1 disable or SSLv2 enabled (since
317 * we MUST do the Client Hello extensions to make these ciphers
319 * -- trim Stream ciphers if DTLSv1 enable
348 /* First skip ECDSA ciphers as appropriate */
368 /* trim out the anonymous (and null-auth-cipher) ciphers */
475 SSLCipherSuite *ciphers, /* RETURNE
472 cipherSuitesToCipherSuites( size_t numCipherSuites, const SSLCipherSuite *cipherSuites, SSLCipherSuite *ciphers, size_t *numCiphers) argument
508 SSLGetSupportedCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument
528 SSLSetEnabledCiphers(SSLContextRef ctx, const SSLCipherSuite *ciphers, size_t numCiphers) argument
603 SSLGetEnabledCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument
[all...]
H A Dsecuretransport++.cpp195 SSLCipherSuite *ciphers,
198 MacOSError::check(SSLGetSupportedCiphers(mContext, ciphers, &numCiphers));
209 SSLCipherSuite *ciphers,
212 MacOSError::check(SSLGetEnabledCiphers(mContext, ciphers, &numCiphers));
216 SSLCipherSuite *ciphers,
219 MacOSError::check(SSLSetEnabledCiphers(mContext, ciphers, numCiphers));
194 supportedCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument
208 enabledCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument
215 enabledCiphers( SSLCipherSuite *ciphers, size_t numCiphers) argument
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/
H A Dsecuretransport++.h51 void supportedCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const;
54 void enabledCiphers(SSLCipherSuite *ciphers, size_t &numCiphers) const; // get
55 void enabledCiphers(SSLCipherSuite *ciphers, size_t numCiphers); // set
H A DsslCipherSpecs.c258 * Also determines if any ECDSA/ECDH ciphers are enabled; we need to know
313 * Trim out inappropriate ciphers:
314 * -- trim anonymous ciphers if !ctx->anonCipherEnable
315 * -- trim ECDSA ciphers for server side if appropriate
316 * -- trim ECDSA ciphers if TLSv1 disable or SSLv2 enabled (since
317 * we MUST do the Client Hello extensions to make these ciphers
319 * -- trim Stream ciphers if DTLSv1 enable
348 /* First skip ECDSA ciphers as appropriate */
368 /* trim out the anonymous (and null-auth-cipher) ciphers */
475 SSLCipherSuite *ciphers, /* RETURNE
472 cipherSuitesToCipherSuites( size_t numCipherSuites, const SSLCipherSuite *cipherSuites, SSLCipherSuite *ciphers, size_t *numCiphers) argument
508 SSLGetSupportedCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument
528 SSLSetEnabledCiphers(SSLContextRef ctx, const SSLCipherSuite *ciphers, size_t numCiphers) argument
603 SSLGetEnabledCiphers(SSLContextRef ctx, SSLCipherSuite *ciphers, size_t *numCiphers) argument
[all...]
H A Dsecuretransport++.cpp195 SSLCipherSuite *ciphers,
198 MacOSError::check(SSLGetSupportedCiphers(mContext, ciphers, &numCiphers));
209 SSLCipherSuite *ciphers,
212 MacOSError::check(SSLGetEnabledCiphers(mContext, ciphers, &numCiphers));
216 SSLCipherSuite *ciphers,
219 MacOSError::check(SSLSetEnabledCiphers(mContext, ciphers, numCiphers));
194 supportedCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument
208 enabledCiphers( SSLCipherSuite *ciphers, size_t &numCiphers) const argument
215 enabledCiphers( SSLCipherSuite *ciphers, size_t numCiphers) argument
/macosx-10.9.5/ruby-104/ruby/test/openssl/
H A Dtest_pair.rb13 ctx.ciphers = "ADH"
23 ctx.ciphers = "ADH"
193 ctx.ciphers = "ADH"
221 ctx.ciphers = "ADH"
H A Dtest_cipher.rb10 ciphers = OpenSSL::Cipher.ciphers
11 # redefine method so we can use the cached ciphers value from the closure
14 ciphers.include?(name)
105 OpenSSL::Cipher.ciphers.each{|name|
/macosx-10.9.5/Security-55471.14.18/tlsnke/tlsnketest/
H A Dst_test.c54 Below are all the ciphers that are individually tested. The first element
56 can be looked up in ciphers(1).
94 static const CipherSuiteName ciphers[] = { variable
140 /* Export ciphers are disabled */
160 const CipherSuiteName *a = ciphers;
170 const CipherSuiteName *a = ciphers;
673 for (i=0; ciphers[i].cipher != (SSLCipherSuite)(-1); i++) {
695 client_side_auth, ciphers[i].dh_anonymous, d,
698 client_side_auth, ciphers[i].dh_anonymous, d,
705 require_noerr(SSLSetEnabledCiphers(client->st, &ciphers[
[all...]
/macosx-10.9.5/OpenSSH-186/openssh/
H A Dreadconf.h82 char *ciphers; /* SSH2 ciphers in order of preference. */ member in struct:__anon3331
H A Dcipher.c72 } ciphers[] = { variable in typeref:struct:Cipher
157 for (c = ciphers; c->name != NULL; c++)
167 for (c = ciphers; c->name != NULL; c++)
195 debug3("ciphers ok: [%s]", names);
211 for (c = ciphers; c->name != NULL; c++)
H A Dservconf.h88 char *ciphers; /* Supported SSH2 ciphers. */ member in struct:__anon3339
/macosx-10.9.5/tcl-102/tcl_ext/tls/tls/
H A Dtls.c67 char *cert, char *CAdir, char *CAfile, char *ciphers));
452 * CiphersObjCmd -- list available ciphers
454 * This procedure is invoked to process the "tls::ciphers" command
455 * to list available ciphers, based upon protocol selected.
679 char *ciphers = NULL;
726 OPTSTR( "-cipher", ciphers);
754 if (ciphers && !*ciphers) ciphers = NULL;
807 if ((ctx = CTX_Init(statePtr, proto, key, cert, CAdir, CAfile, ciphers))
672 char *ciphers = NULL; local
1118 char *channelName, *ciphers; local
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/sslViewer/
H A DsslAppUtils.h103 const SSLCipherSuite *ciphers);

Completed in 392 milliseconds

123