Searched refs:ciphersuites (Results 1 - 25 of 25) sorted by relevance

/netbsd-current/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
H A DClientHello.pm37 $self->{ciphersuites} = [];
59 my @ciphersuites = unpack('n*', substr($self->data, $ptr,
88 $self->ciphersuites(\@ciphersuites);
142 $data .= pack("n*", @{$self->ciphersuites});
208 sub ciphersuites subroutine
212 $self->{ciphersuites} = shift;
214 return $self->{ciphersuites};
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/recipes/
H A D70-test_tls13downgrade.t107 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA);
108 $message->ciphersuite_len(2 * scalar @ciphersuites);
109 $message->ciphersuites(\@ciphersuites);
H A D70-test_tls13hrr.t53 #Test 2: It is an error if the client changes the offered ciphersuites so that
136 my @ciphersuites = (TLSProxy::Message::CIPHER_TLS13_AES_128_GCM_SHA256);
137 $ch1->ciphersuite_len(2 * scalar @ciphersuites);
138 $ch1->ciphersuites(\@ciphersuites);
H A D80-test_ssl_old.t396 subtest "Testing ciphersuites" => sub {
416 my %ciphersuites = ();
425 $ciphersuites{$protocol} = [ map { s|\R||; split(/:/, $_) }
427 $protocolciphersuitecount += scalar @{$ciphersuites{$protocol}};
431 plan skip_all => "None of the ciphersuites to test are available in this OpenSSL build"
432 if $protocolciphersuitecount + scalar(keys %ciphersuites) == 0;
434 # The count of protocols is because in addition to the ciphersuites
438 + scalar(keys %ciphersuites);
446 foreach my $protocol (sort keys %ciphersuites) {
447 note "Testing ciphersuites fo
[all...]
H A D70-test_renegotiation.t105 #Remove any SCSV ciphersuites - just leave AES128-SHA (0x002f)
107 $message->ciphersuites(\@ciphersuite);
/netbsd-current/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
H A DClientHello.pm37 $self->{ciphersuites} = [];
59 my @ciphersuites = unpack('n*', substr($self->data, $ptr,
88 $self->ciphersuites(\@ciphersuites);
142 $data .= pack("n*", @{$self->ciphersuites});
208 sub ciphersuites subroutine
212 $self->{ciphersuites} = shift;
214 return $self->{ciphersuites};
/netbsd-current/crypto/external/bsd/openssl/dist/test/recipes/
H A D70-test_tls13downgrade.t110 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA);
111 $message->ciphersuite_len(2 * scalar @ciphersuites);
112 $message->ciphersuites(\@ciphersuites);
H A D70-test_tls13hrr.t58 #Test 2: It is an error if the client changes the offered ciphersuites so that
163 my @ciphersuites = (TLSProxy::Message::CIPHER_TLS13_AES_128_GCM_SHA256);
164 $ch1->ciphersuite_len(2 * scalar @ciphersuites);
165 $ch1->ciphersuites(\@ciphersuites);
H A D80-test_ssl_old.t434 subtest "Testing ciphersuites" => sub {
454 my %ciphersuites = ();
468 $ciphersuites{$protocol} = [ map { s|\R||; split(/:/, $_) }
470 $protocolciphersuitecount += scalar @{$ciphersuites{$protocol}};
475 plan skip_all => "None of the ciphersuites to test are available in this OpenSSL build"
476 if $protocolciphersuitecount + scalar(keys %ciphersuites) == 0;
478 # The count of protocols is because in addition to the ciphersuites
482 + scalar(keys %ciphersuites);
490 foreach my $protocol (sort keys %ciphersuites) {
491 note "Testing ciphersuites fo
[all...]
H A D70-test_renegotiation.t124 #Remove any SCSV ciphersuites - just leave AES128-SHA (0x002f)
126 $message->ciphersuites(\@ciphersuite);
/netbsd-current/crypto/external/bsd/openssl.old/dist/apps/
H A Dciphers.c55 {"psk", OPT_PSK, '-', "include ciphersuites requiring PSK"},
58 {"srp", OPT_SRP, '-', "include ciphersuites requiring SRP"},
61 {"ciphersuites", OPT_CIPHERSUITES, 's',
62 "Configure the TLSv1.3 ciphersuites to use"},
97 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; local
160 ciphersuites = opt_arg();
196 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) {
197 BIO_printf(bio_err, "Error setting TLSv1.3 ciphersuites\n");
H A Ds_time.c58 {"ciphersuites", OPT_CIPHERSUITES, 's',
59 "Specify TLSv1.3 ciphersuites to be used"},
97 char *CApath = NULL, *CAfile = NULL, *cipher = NULL, *ciphersuites = NULL; local
163 ciphersuites = opt_arg();
204 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites))
/netbsd-current/crypto/external/bsd/openssl/dist/apps/
H A Dciphers.c64 {"psk", OPT_PSK, '-', "Include ciphersuites requiring PSK"},
67 {"srp", OPT_SRP, '-', "(deprecated) Include ciphersuites requiring SRP"},
69 {"ciphersuites", OPT_CIPHERSUITES, 's',
70 "Configure the TLSv1.3 ciphersuites to use"},
103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; local
166 ciphersuites = opt_arg();
207 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) {
208 BIO_printf(bio_err, "Error setting TLSv1.3 ciphersuites\n");
H A Ds_time.c66 {"ciphersuites", OPT_CIPHERSUITES, 's',
67 "Specify TLSv1.3 ciphersuites to be used"},
122 char *cipher = NULL, *ciphersuites = NULL; local
193 ciphersuites = opt_arg();
257 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites))
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/
H A Dssltest_old.c617 static char *ciphersuites = NULL; variable
688 fprintf(stderr, " -ciphersuites arg - The TLSv1.3 ciphersuites\n");
1081 } else if (strcmp(*argv, "-ciphersuites") == 0) {
1084 ciphersuites = *(++argv);
1401 * Since we will use low security ciphersuites and keys for testing set
1472 if (ciphersuites != NULL) {
1473 if (!SSL_CTX_set_ciphersuites(c_ctx, ciphersuites)
1474 || !SSL_CTX_set_ciphersuites(s_ctx, ciphersuites)
1475 || !SSL_CTX_set_ciphersuites(s_ctx2, ciphersuites)) {
[all...]
/netbsd-current/crypto/external/bsd/openssl/dist/test/
H A Dssl_old_test.c612 static char *ciphersuites = NULL; variable
681 fprintf(stderr, " -ciphersuites arg - The TLSv1.3 ciphersuites\n");
1054 } else if (strcmp(*argv, "-ciphersuites") == 0) {
1057 ciphersuites = *(++argv);
1395 * Since we will use low security ciphersuites and keys for testing set
1466 if (ciphersuites != NULL) {
1467 if (!SSL_CTX_set_ciphersuites(c_ctx, ciphersuites)
1468 || !SSL_CTX_set_ciphersuites(s_ctx, ciphersuites)
1469 || !SSL_CTX_set_ciphersuites(s_ctx2, ciphersuites)) {
[all...]
H A Dsslapitest.c3884 static const char *ciphersuites[] = { variable
3925 if (!TEST_true(SSL_CTX_set_ciphersuites(sctx, ciphersuites[cipher]))
3926 || !TEST_true(SSL_CTX_set_ciphersuites(cctx, ciphersuites[cipher])))
4083 idx % OSSL_NELEM(ciphersuites),
4084 idx / OSSL_NELEM(ciphersuites));
4094 idx % OSSL_NELEM(ciphersuites),
4095 idx / OSSL_NELEM(ciphersuites));
4106 idx % OSSL_NELEM(ciphersuites),
4107 idx / OSSL_NELEM(ciphersuites));
4117 idx % OSSL_NELEM(ciphersuites),
[all...]
/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/
H A Dssl_ciph.c205 * "COMPLEMENTOFDEFAULT" (does *not* include ciphersuites not found in
877 * most recently deleted ciphersuites get best positions for
1277 STACK_OF(SSL_CIPHER) *ciphersuites = (STACK_OF(SSL_CIPHER) *)arg;
1296 if (!sk_SSL_CIPHER_push(ciphersuites, cipher)) {
1352 * Delete any existing TLSv1.3 ciphersuites. These are always first in the
1360 /* Insert the new TLSv1.3 ciphersuites */
1717 /* New GOST ciphersuites have both SSL_aGOST12 and SSL_aGOST01 bits */
H A Dssl_local.h184 /* Any appropriate key exchange algorithm (for TLS 1.3 ciphersuites) */
204 /* Any appropriate signature auth (for TLS 1.3 ciphersuites) */
298 * Stream MAC for GOST ciphersuites from cryptopro draft (currently this also
346 * Allow TLS 1.2 ciphersuites: applies to DTLS 1.2 as well as TLS 1.2: may
352 * Determine if a client can use TLS 1.2 ciphersuites: can't rely on method
680 PACKET ciphersuites; member in struct:__anon393
740 /* TLSv1.3 specific ciphersuites */
1135 /* TLSv1.3 specific ciphersuites */
1996 * Allow TLS 1.2 ciphersuites: applies to DTLS 1.2 as well as TLS 1.2: may
H A Dssl_lib.c716 /* Shallow copy of the ciphersuites stack */
5170 *out = PACKET_data(&s->clienthello->ciphersuites);
5171 return PACKET_remaining(&s->clienthello->ciphersuites);
5390 * ciphersuites with a non-zero leading byte then we are going to
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/
H A Dssl_ciph.c172 * "COMPLEMENTOFDEFAULT" (does *not* include ciphersuites not found in
913 * most recently deleted ciphersuites get best positions for
1307 STACK_OF(SSL_CIPHER) *ciphersuites = (STACK_OF(SSL_CIPHER) *)arg;
1324 if (!sk_SSL_CIPHER_push(ciphersuites, cipher)) {
1383 * Delete any existing TLSv1.3 ciphersuites. These are always first in the
1391 /* Insert the new TLSv1.3 ciphersuites */
1395 /* Don't include any TLSv1.3 ciphersuites that are disabled */
1775 /* New GOST ciphersuites have both SSL_aGOST12 and SSL_aGOST01 bits */
H A Dssl_local.h190 /* Any appropriate key exchange algorithm (for TLS 1.3 ciphersuites) */
210 /* Any appropriate signature auth (for TLS 1.3 ciphersuites) */
315 * Stream MAC for GOST ciphersuites from cryptopro draft (currently this also
368 * Allow TLS 1.2 ciphersuites: applies to DTLS 1.2 as well as TLS 1.2: may
374 * Determine if a client can use TLS 1.2 ciphersuites: can't rely on method
732 PACKET ciphersuites; member in struct:__anon582
848 /* TLSv1.3 specific ciphersuites */
1451 /* TLSv1.3 specific ciphersuites */
2121 * Allow TLS 1.2 ciphersuites: applies to DTLS 1.2 as well as TLS 1.2: may
H A Dssl_lib.c725 /* Shallow copy of the ciphersuites stack */
5416 *out = PACKET_data(&s->clienthello->ciphersuites);
5417 return PACKET_remaining(&s->clienthello->ciphersuites);
5634 * ciphersuites with a non-zero leading byte then we are going to
/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/statem/
H A Dstatem_srvr.c237 * For the ECDH ciphersuites when the client sends its ECDH
239 * not sent. Also for GOST ciphersuites when the client uses
331 * ECC ciphersuites, we send a serverKeyExchange message only if
384 * never request cert in anonymous ciphersuites (see
1489 if (!PACKET_get_sub_packet(pkt, &clienthello->ciphersuites,
1558 if (!PACKET_get_length_prefixed_2(pkt, &clienthello->ciphersuites)) {
1734 if (!ssl_cache_cipherlist(s, &clienthello->ciphersuites,
1736 !bytes_to_cipher_list(s, &clienthello->ciphersuites, &ciphers, &scsvs,
3115 * protocol does not offer such protection for DH ciphersuites).
3365 * New GOST ciphersuites hav
[all...]
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/statem/
H A Dstatem_srvr.c238 * For the ECDH ciphersuites when the client sends its ECDH
240 * not sent. Also for GOST ciphersuites when the client uses
330 * ECC ciphersuites, we send a serverKeyExchange message only if
383 * never request cert in anonymous ciphersuites (see
1474 if (!PACKET_get_sub_packet(pkt, &clienthello->ciphersuites,
1538 if (!PACKET_get_length_prefixed_2(pkt, &clienthello->ciphersuites)) {
1699 if (!ssl_cache_cipherlist(s, &clienthello->ciphersuites,
1701 !bytes_to_cipher_list(s, &clienthello->ciphersuites, &ciphers, &scsvs,
3117 * New GOST ciphersuites have SSL_aGOST01 bit too

Completed in 396 milliseconds