/netbsd-current/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
H A D | ClientHello.pm | 37 $self->{ciphersuites} = []; 59 my @ciphersuites = unpack('n*', substr($self->data, $ptr, 88 $self->ciphersuites(\@ciphersuites); 142 $data .= pack("n*", @{$self->ciphersuites}); 208 sub ciphersuites subroutine 212 $self->{ciphersuites} = shift; 214 return $self->{ciphersuites};
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/recipes/ |
H A D | 70-test_tls13downgrade.t | 107 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA); 108 $message->ciphersuite_len(2 * scalar @ciphersuites); 109 $message->ciphersuites(\@ciphersuites);
|
H A D | 70-test_tls13hrr.t | 53 #Test 2: It is an error if the client changes the offered ciphersuites so that 136 my @ciphersuites = (TLSProxy::Message::CIPHER_TLS13_AES_128_GCM_SHA256); 137 $ch1->ciphersuite_len(2 * scalar @ciphersuites); 138 $ch1->ciphersuites(\@ciphersuites);
|
H A D | 80-test_ssl_old.t | 396 subtest "Testing ciphersuites" => sub { 416 my %ciphersuites = (); 425 $ciphersuites{$protocol} = [ map { s|\R||; split(/:/, $_) } 427 $protocolciphersuitecount += scalar @{$ciphersuites{$protocol}}; 431 plan skip_all => "None of the ciphersuites to test are available in this OpenSSL build" 432 if $protocolciphersuitecount + scalar(keys %ciphersuites) == 0; 434 # The count of protocols is because in addition to the ciphersuites 438 + scalar(keys %ciphersuites); 446 foreach my $protocol (sort keys %ciphersuites) { 447 note "Testing ciphersuites fo [all...] |
H A D | 70-test_renegotiation.t | 105 #Remove any SCSV ciphersuites - just leave AES128-SHA (0x002f) 107 $message->ciphersuites(\@ciphersuite);
|
/netbsd-current/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
H A D | ClientHello.pm | 37 $self->{ciphersuites} = []; 59 my @ciphersuites = unpack('n*', substr($self->data, $ptr, 88 $self->ciphersuites(\@ciphersuites); 142 $data .= pack("n*", @{$self->ciphersuites}); 208 sub ciphersuites subroutine 212 $self->{ciphersuites} = shift; 214 return $self->{ciphersuites};
|
/netbsd-current/crypto/external/bsd/openssl/dist/test/recipes/ |
H A D | 70-test_tls13downgrade.t | 110 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA); 111 $message->ciphersuite_len(2 * scalar @ciphersuites); 112 $message->ciphersuites(\@ciphersuites);
|
H A D | 70-test_tls13hrr.t | 58 #Test 2: It is an error if the client changes the offered ciphersuites so that 163 my @ciphersuites = (TLSProxy::Message::CIPHER_TLS13_AES_128_GCM_SHA256); 164 $ch1->ciphersuite_len(2 * scalar @ciphersuites); 165 $ch1->ciphersuites(\@ciphersuites);
|
H A D | 80-test_ssl_old.t | 434 subtest "Testing ciphersuites" => sub { 454 my %ciphersuites = (); 468 $ciphersuites{$protocol} = [ map { s|\R||; split(/:/, $_) } 470 $protocolciphersuitecount += scalar @{$ciphersuites{$protocol}}; 475 plan skip_all => "None of the ciphersuites to test are available in this OpenSSL build" 476 if $protocolciphersuitecount + scalar(keys %ciphersuites) == 0; 478 # The count of protocols is because in addition to the ciphersuites 482 + scalar(keys %ciphersuites); 490 foreach my $protocol (sort keys %ciphersuites) { 491 note "Testing ciphersuites fo [all...] |
H A D | 70-test_renegotiation.t | 124 #Remove any SCSV ciphersuites - just leave AES128-SHA (0x002f) 126 $message->ciphersuites(\@ciphersuite);
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/apps/ |
H A D | ciphers.c | 55 {"psk", OPT_PSK, '-', "include ciphersuites requiring PSK"}, 58 {"srp", OPT_SRP, '-', "include ciphersuites requiring SRP"}, 61 {"ciphersuites", OPT_CIPHERSUITES, 's', 62 "Configure the TLSv1.3 ciphersuites to use"}, 97 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; local 160 ciphersuites = opt_arg(); 196 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) { 197 BIO_printf(bio_err, "Error setting TLSv1.3 ciphersuites\n");
|
H A D | s_time.c | 58 {"ciphersuites", OPT_CIPHERSUITES, 's', 59 "Specify TLSv1.3 ciphersuites to be used"}, 97 char *CApath = NULL, *CAfile = NULL, *cipher = NULL, *ciphersuites = NULL; local 163 ciphersuites = opt_arg(); 204 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites))
|
/netbsd-current/crypto/external/bsd/openssl/dist/apps/ |
H A D | ciphers.c | 64 {"psk", OPT_PSK, '-', "Include ciphersuites requiring PSK"}, 67 {"srp", OPT_SRP, '-', "(deprecated) Include ciphersuites requiring SRP"}, 69 {"ciphersuites", OPT_CIPHERSUITES, 's', 70 "Configure the TLSv1.3 ciphersuites to use"}, 103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; local 166 ciphersuites = opt_arg(); 207 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) { 208 BIO_printf(bio_err, "Error setting TLSv1.3 ciphersuites\n");
|
H A D | s_time.c | 66 {"ciphersuites", OPT_CIPHERSUITES, 's', 67 "Specify TLSv1.3 ciphersuites to be used"}, 122 char *cipher = NULL, *ciphersuites = NULL; local 193 ciphersuites = opt_arg(); 257 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites))
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/ |
H A D | ssltest_old.c | 617 static char *ciphersuites = NULL; variable 688 fprintf(stderr, " -ciphersuites arg - The TLSv1.3 ciphersuites\n"); 1081 } else if (strcmp(*argv, "-ciphersuites") == 0) { 1084 ciphersuites = *(++argv); 1401 * Since we will use low security ciphersuites and keys for testing set 1472 if (ciphersuites != NULL) { 1473 if (!SSL_CTX_set_ciphersuites(c_ctx, ciphersuites) 1474 || !SSL_CTX_set_ciphersuites(s_ctx, ciphersuites) 1475 || !SSL_CTX_set_ciphersuites(s_ctx2, ciphersuites)) { [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/test/ |
H A D | ssl_old_test.c | 612 static char *ciphersuites = NULL; variable 681 fprintf(stderr, " -ciphersuites arg - The TLSv1.3 ciphersuites\n"); 1054 } else if (strcmp(*argv, "-ciphersuites") == 0) { 1057 ciphersuites = *(++argv); 1395 * Since we will use low security ciphersuites and keys for testing set 1466 if (ciphersuites != NULL) { 1467 if (!SSL_CTX_set_ciphersuites(c_ctx, ciphersuites) 1468 || !SSL_CTX_set_ciphersuites(s_ctx, ciphersuites) 1469 || !SSL_CTX_set_ciphersuites(s_ctx2, ciphersuites)) { [all...] |
H A D | sslapitest.c | 3884 static const char *ciphersuites[] = { variable 3925 if (!TEST_true(SSL_CTX_set_ciphersuites(sctx, ciphersuites[cipher])) 3926 || !TEST_true(SSL_CTX_set_ciphersuites(cctx, ciphersuites[cipher]))) 4083 idx % OSSL_NELEM(ciphersuites), 4084 idx / OSSL_NELEM(ciphersuites)); 4094 idx % OSSL_NELEM(ciphersuites), 4095 idx / OSSL_NELEM(ciphersuites)); 4106 idx % OSSL_NELEM(ciphersuites), 4107 idx / OSSL_NELEM(ciphersuites)); 4117 idx % OSSL_NELEM(ciphersuites), [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/ |
H A D | ssl_ciph.c | 205 * "COMPLEMENTOFDEFAULT" (does *not* include ciphersuites not found in 877 * most recently deleted ciphersuites get best positions for 1277 STACK_OF(SSL_CIPHER) *ciphersuites = (STACK_OF(SSL_CIPHER) *)arg; 1296 if (!sk_SSL_CIPHER_push(ciphersuites, cipher)) { 1352 * Delete any existing TLSv1.3 ciphersuites. These are always first in the 1360 /* Insert the new TLSv1.3 ciphersuites */ 1717 /* New GOST ciphersuites have both SSL_aGOST12 and SSL_aGOST01 bits */
|
H A D | ssl_local.h | 184 /* Any appropriate key exchange algorithm (for TLS 1.3 ciphersuites) */ 204 /* Any appropriate signature auth (for TLS 1.3 ciphersuites) */ 298 * Stream MAC for GOST ciphersuites from cryptopro draft (currently this also 346 * Allow TLS 1.2 ciphersuites: applies to DTLS 1.2 as well as TLS 1.2: may 352 * Determine if a client can use TLS 1.2 ciphersuites: can't rely on method 680 PACKET ciphersuites; member in struct:__anon393 740 /* TLSv1.3 specific ciphersuites */ 1135 /* TLSv1.3 specific ciphersuites */ 1996 * Allow TLS 1.2 ciphersuites: applies to DTLS 1.2 as well as TLS 1.2: may
|
H A D | ssl_lib.c | 716 /* Shallow copy of the ciphersuites stack */ 5170 *out = PACKET_data(&s->clienthello->ciphersuites); 5171 return PACKET_remaining(&s->clienthello->ciphersuites); 5390 * ciphersuites with a non-zero leading byte then we are going to
|
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/ |
H A D | ssl_ciph.c | 172 * "COMPLEMENTOFDEFAULT" (does *not* include ciphersuites not found in 913 * most recently deleted ciphersuites get best positions for 1307 STACK_OF(SSL_CIPHER) *ciphersuites = (STACK_OF(SSL_CIPHER) *)arg; 1324 if (!sk_SSL_CIPHER_push(ciphersuites, cipher)) { 1383 * Delete any existing TLSv1.3 ciphersuites. These are always first in the 1391 /* Insert the new TLSv1.3 ciphersuites */ 1395 /* Don't include any TLSv1.3 ciphersuites that are disabled */ 1775 /* New GOST ciphersuites have both SSL_aGOST12 and SSL_aGOST01 bits */
|
H A D | ssl_local.h | 190 /* Any appropriate key exchange algorithm (for TLS 1.3 ciphersuites) */ 210 /* Any appropriate signature auth (for TLS 1.3 ciphersuites) */ 315 * Stream MAC for GOST ciphersuites from cryptopro draft (currently this also 368 * Allow TLS 1.2 ciphersuites: applies to DTLS 1.2 as well as TLS 1.2: may 374 * Determine if a client can use TLS 1.2 ciphersuites: can't rely on method 732 PACKET ciphersuites; member in struct:__anon582 848 /* TLSv1.3 specific ciphersuites */ 1451 /* TLSv1.3 specific ciphersuites */ 2121 * Allow TLS 1.2 ciphersuites: applies to DTLS 1.2 as well as TLS 1.2: may
|
H A D | ssl_lib.c | 725 /* Shallow copy of the ciphersuites stack */ 5416 *out = PACKET_data(&s->clienthello->ciphersuites); 5417 return PACKET_remaining(&s->clienthello->ciphersuites); 5634 * ciphersuites with a non-zero leading byte then we are going to
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
H A D | statem_srvr.c | 237 * For the ECDH ciphersuites when the client sends its ECDH 239 * not sent. Also for GOST ciphersuites when the client uses 331 * ECC ciphersuites, we send a serverKeyExchange message only if 384 * never request cert in anonymous ciphersuites (see 1489 if (!PACKET_get_sub_packet(pkt, &clienthello->ciphersuites, 1558 if (!PACKET_get_length_prefixed_2(pkt, &clienthello->ciphersuites)) { 1734 if (!ssl_cache_cipherlist(s, &clienthello->ciphersuites, 1736 !bytes_to_cipher_list(s, &clienthello->ciphersuites, &ciphers, &scsvs, 3115 * protocol does not offer such protection for DH ciphersuites). 3365 * New GOST ciphersuites hav [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/statem/ |
H A D | statem_srvr.c | 238 * For the ECDH ciphersuites when the client sends its ECDH 240 * not sent. Also for GOST ciphersuites when the client uses 330 * ECC ciphersuites, we send a serverKeyExchange message only if 383 * never request cert in anonymous ciphersuites (see 1474 if (!PACKET_get_sub_packet(pkt, &clienthello->ciphersuites, 1538 if (!PACKET_get_length_prefixed_2(pkt, &clienthello->ciphersuites)) { 1699 if (!ssl_cache_cipherlist(s, &clienthello->ciphersuites, 1701 !bytes_to_cipher_list(s, &clienthello->ciphersuites, &ciphers, &scsvs, 3117 * New GOST ciphersuites have SSL_aGOST01 bit too
|