Lines Matching full:suites
29 * configures a list of cipher suites and algorithm implementations.
38 * supported (protocol versions and cipher suites).
51 * A list of cipher suites, by preference (first is most in example_client_profile()
52 * preferred). The list below contains all cipher suites supported in example_client_profile()
55 static const uint16_t suites[] = { in example_client_profile() local
114 * -- cipher suites with a name ending in "SHA384" need "prf_sha384"; in example_client_profile()
131 * -- With TLS 1.2, cipher suites with a name ending in "SHA384" in example_client_profile()
133 * -- With TLS 1.2, cipher suites with a name ending in "SHA256" in example_client_profile()
135 * -- With TLS 1.2, cipher suites with a name ending in "SHA" in example_client_profile()
140 * cipher suites), and on the client side (for client in example_client_profile()
160 * Set the cipher suites. All specified cipher suite MUST be in example_client_profile()
165 br_ssl_engine_set_suites(&cc->eng, suites, in example_client_profile()
166 (sizeof suites) / (sizeof suites[0])); in example_client_profile()
172 * (cipher suites whose name starts with TLS_RSA). in example_client_profile()
175 * "ECDHE_RSA" cipher suites (not ECDH_RSA). in example_client_profile()
178 * suites that use elliptic curves (both "ECDH" and "ECDHE" in example_client_profile()
179 * cipher suites). in example_client_profile()
182 * cipher suites (but not for ECDHE_RSA, ECDH_ECDSA or ECDH_RSA). in example_client_profile()
242 * -- Cipher suites in AES_128_CBC, AES_256_CBC and 3DES_EDE_CBC in example_client_profile()
244 * -- Cipher suites in AES_128_GCM and AES_256_GCM need the GCM in example_client_profile()
246 * -- Cipher suites in CHACHA20_POLY1305 need the ChaCha20+Poly1305 in example_client_profile()
413 * Set suites and asymmetric crypto implementations. We use the in example_client_profile()
454 * key, so the list of cipher suites is trimmed down for RSA.
461 static const uint16_t suites[] = { in example_server_profile() local
501 br_ssl_engine_set_suites(&cc->eng, suites, in example_server_profile()
502 (sizeof suites) / (sizeof suites[0])); in example_server_profile()
505 * Elliptic curve implementation is used for ECDHE suites (but in example_server_profile()
533 * -- "ECDH" cipher suites use only the EC code (&br_ec_prime_i31); in example_server_profile()
534 * the ECDHE_ECDSA cipher suites need both the EC code and in example_server_profile()
537 * -- For "ECDH" (not "ECDHE") cipher suites, the engine must in example_server_profile()