/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-ciphers.pod.in | 64 When combined with B<-s> includes cipher suites which require PSK. 68 When combined with B<-s> includes cipher suites which require SRP. This option 122 It can represent a list of cipher suites containing a certain algorithm, or 123 cipher suites of a certain type. For example B<SHA1> represents all ciphers 124 suites using the digest algorithm SHA1 and B<SSLv3> represents all SSL v3 127 Lists of cipher suites can be combined in a single cipher string using the 129 B<SHA1+DES> represents all cipher suites containing the SHA1 B<and> the DES 176 necessary). Note that RC4 based cipher suites are not built into OpenSSL by 181 All cipher suites except the B<eNULL> ciphers (which must be explicitly enabled 183 As of OpenSSL 1.0.0, the B<ALL> cipher suites are sensibly ordered by default. [all …]
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-ciphers.1 | 200 When combined with \fB\-s\fR includes cipher suites which require \s-1PSK.\s0 203 When combined with \fB\-s\fR includes cipher suites which require \s-1SRP.\s0 This option 249 It can represent a list of cipher suites containing a certain algorithm, or 250 cipher suites of a certain type. For example \fB\s-1SHA1\s0\fR represents all ciphers 251 suites using the digest algorithm \s-1SHA1\s0 and \fBSSLv3\fR represents all \s-1SSL\s0 v3 254 Lists of cipher suites can be combined in a single cipher string using the 256 \&\fB\s-1SHA1+DES\s0\fR represents all cipher suites containing the \s-1SHA1\s0 \fBand\fR the \s-1D… 299 necessary). Note that \s-1RC4\s0 based cipher suites are not built into OpenSSL by 303 All cipher suites except the \fBeNULL\fR ciphers (which must be explicitly enabled 305 As of OpenSSL 1.0.0, the \fB\s-1ALL\s0\fR cipher suites are sensibly ordered by default. [all …]
|
/freebsd/contrib/bearssl/samples/ |
H A D | custom_profile.c | 29 * configures a list of cipher suites and algorithm implementations. 38 * supported (protocol versions and cipher suites). 51 * A list of cipher suites, by preference (first is most in example_client_profile() 52 * preferred). The list below contains all cipher suites supported in example_client_profile() 55 static const uint16_t suites[] = { in example_client_profile() local 114 * -- cipher suites with a name ending in "SHA384" need "prf_sha384"; in example_client_profile() 131 * -- With TLS 1.2, cipher suites with a name ending in "SHA384" in example_client_profile() 133 * -- With TLS 1.2, cipher suites with a name ending in "SHA256" in example_client_profile() 135 * -- With TLS 1.2, cipher suites with a name ending in "SHA" in example_client_profile() 140 * cipher suites), and on the client side (for client in example_client_profile() [all …]
|
/freebsd/contrib/wpa/src/tls/ |
H A D | tlsv1_client.c | 469 u16 *suites; in tlsv1_client_init() local 485 suites = conn->cipher_suites; in tlsv1_client_init() 486 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA256; in tlsv1_client_init() 487 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA256; in tlsv1_client_init() 488 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA; in tlsv1_client_init() 489 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA; in tlsv1_client_init() 490 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA256; in tlsv1_client_init() 491 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA256; in tlsv1_client_init() 492 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA; in tlsv1_client_init() 493 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA; in tlsv1_client_init() [all …]
|
H A D | tlsv1_server.c | 381 u16 *suites; in tlsv1_server_init() local 399 suites = conn->cipher_suites; in tlsv1_server_init() 400 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA256; in tlsv1_server_init() 401 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA256; in tlsv1_server_init() 402 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA; in tlsv1_server_init() 403 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA; in tlsv1_server_init() 404 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA256; in tlsv1_server_init() 405 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA256; in tlsv1_server_init() 406 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA; in tlsv1_server_init() 407 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA; in tlsv1_server_init() [all …]
|
/freebsd/contrib/bearssl/src/ssl/ |
H A D | ssl_server_full_ec.c | 34 * The "full" profile supports all implemented cipher suites. in br_ssl_server_init_full_ec() 47 * Note that for ECDH suites, the list will be automatically in br_ssl_server_init_full_ec() 50 static const uint16_t suites[] = { in br_ssl_server_init_full_ec() local 103 * Set suites and elliptic curve implementation (for ECDHE). in br_ssl_server_init_full_ec() 105 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_full_ec() 106 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_full_ec()
|
H A D | ssl_server_full_rsa.c | 34 * The "full" profile supports all implemented cipher suites. in br_ssl_server_init_full_rsa() 46 static const uint16_t suites[] = { in br_ssl_server_init_full_rsa() local 92 * Set suites and elliptic curve implementation (for ECDHE). in br_ssl_server_init_full_rsa() 94 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_full_rsa() 95 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_full_rsa()
|
H A D | ssl_server_mine2c.c | 33 static const uint16_t suites[] = { in br_ssl_server_init_mine2c() local 44 * Set suites and elliptic curve implementation (for ECDHE). in br_ssl_server_init_mine2c() 46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_mine2c() 47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_mine2c()
|
H A D | ssl_server_mine2g.c | 33 static const uint16_t suites[] = { in br_ssl_server_init_mine2g() local 44 * Set suites and elliptic curve implementation (for ECDHE). in br_ssl_server_init_mine2g() 46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_mine2g() 47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_mine2g()
|
H A D | ssl_server_minf2c.c | 33 static const uint16_t suites[] = { in br_ssl_server_init_minf2c() local 44 * Set suites and elliptic curve implementation (for ECDHE). in br_ssl_server_init_minf2c() 46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minf2c() 47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minf2c()
|
H A D | ssl_server_minf2g.c | 33 static const uint16_t suites[] = { in br_ssl_server_init_minf2g() local 44 * Set suites and elliptic curve implementation (for ECDHE). in br_ssl_server_init_minf2g() 46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minf2g() 47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minf2g()
|
H A D | ssl_server_minr2g.c | 33 static const uint16_t suites[] = { in br_ssl_server_init_minr2g() local 44 * Set suites. in br_ssl_server_init_minr2g() 46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minr2g() 47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minr2g()
|
H A D | ssl_server_minu2g.c | 33 static const uint16_t suites[] = { in br_ssl_server_init_minu2g() local 44 * Set suites. in br_ssl_server_init_minu2g() 46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minu2g() 47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minu2g()
|
H A D | ssl_server_minv2g.c | 33 static const uint16_t suites[] = { in br_ssl_server_init_minv2g() local 44 * Set suites. in br_ssl_server_init_minv2g() 46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minv2g() 47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minv2g()
|
H A D | ssl_client_full.c | 34 * The "full" profile supports all implemented cipher suites. in br_ssl_client_init_full() 52 static const uint16_t suites[] = { in br_ssl_client_init_full() local 131 * Set suites and asymmetric crypto implementations. We use the in br_ssl_client_init_full() 136 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_client_init_full() 137 (sizeof suites) / (sizeof suites[0])); in br_ssl_client_init_full()
|
/freebsd/contrib/bearssl/tools/ |
H A D | twrch.c | 83 " -cs names set list of supported cipher suites (comma-separated)\n"); in usage_twrch() 89 " -serverpref enforce server's preferences for cipher suites\n"); in usage_twrch() 247 cipher_suite *suites; in do_twrch() local 282 suites = NULL; in do_twrch() 475 if (suites != NULL) { in do_twrch() 477 " of cipher suites\n"); in do_twrch() 481 suites = parse_suites(arg, &num_suites); in do_twrch() 482 if (suites == NULL) { in do_twrch() 602 if (suites == NULL) { in do_twrch() 612 suites = xmalloc(num_suites * sizeof *suites); in do_twrch() [all …]
|
H A D | client.c | 492 " -cs names set list of supported cipher suites (comma-separated)\n"); in usage_client() 522 cipher_suite *suites; in do_client() local 553 suites = NULL; in do_client() 733 if (suites != NULL) { in do_client() 735 " of cipher suites\n"); in do_client() 739 suites = parse_suites(arg, &num_suites); in do_client() 740 if (suites == NULL) { in do_client() 857 if (suites == NULL) { in do_client() 867 suites = xmalloc(num_suites * sizeof *suites); in do_client() 873 suites[num_suites ++] = cipher_suites[u]; in do_client() [all …]
|
H A D | server.c | 261 " -cs names set list of supported cipher suites (comma-separated)\n"); in usage_server() 267 " -serverpref enforce server's preferences for cipher suites\n"); in usage_server() 361 fprintf(stderr, " Compatible cipher suites:\n"); in sp_choose() 636 cipher_suite *suites; in do_server() local 666 suites = NULL; in do_server() 866 if (suites != NULL) { in do_server() 868 " of cipher suites\n"); in do_server() 872 suites = parse_suites(arg, &num_suites); in do_server() 873 if (suites == NULL) { in do_server() 930 if (suites == NULL) { in do_server() [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | README-external.md | 1 Running external test suites with OpenSSL 4 It is possible to integrate external test suites into OpenSSL's `make test`. 90 Updating test suites 93 To update the commit for any of the above test suites:
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_security_level.pod | 78 are prohibited. All export cipher suites are prohibited since they all offer 95 In addition to the level 2 exclusions cipher suites not offering forward 103 prohibited. Cipher suites using SHA1 for the MAC are prohibited. TLS 136 then only cipher suites consistent with the security level are permissible. 145 Some restrictions can be gracefully handled: for example cipher suites
|
H A D | SSL_CIPHER_get_name.pod | 64 If there is no cipher (e.g. for cipher suites with no encryption) then 69 for AEAD cipher suites) then B<NID_undef> is returned. 78 cipher suites) B<NID_kx_any> is returned. Examples (not comprehensive): 88 TLS 1.3 cipher suites) B<NID_auth_any> is returned. Examples (not comprehensive):
|
/freebsd/contrib/kyua/doc/ |
H A D | kyuafile.5.in | 321 Every system has a top directory into which test suites get installed. 324 Within this directory live test suites, each of which is in an independent 329 Kyua allows running all the installed test suites at once in order to 462 .Ss Connecting disjoint test suites 463 Now suppose you had various test suites on your file system and you would 466 The test suites we would like to connect live under
|
/freebsd/contrib/googletest/docs/ |
H A D | primer.md | 19 code. GoogleTest groups related tests into test suites that can share data 90 suites that reflect the structure of the tested code. When multiple tests in a 94 A *test program* can contain multiple test suites. 97 assertion level and building up to tests and test suites. 167 and its individual name. Tests from different test suites can have the same 193 GoogleTest groups the test results by test suites, so logically related tests 199 When naming your test suites and tests, you should follow the same convention as 346 test suites, or even different source files. 387 cannot be expressed within the framework of fixtures and test suites.
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | SSL_CTX_set_security_level.3 | 208 are prohibited. All export cipher suites are prohibited since they all offer 223 In addition to the level 2 exclusions cipher suites not offering forward 230 prohibited. Cipher suites using \s-1SHA1\s0 for the \s-1MAC\s0 are prohibited. \s-1TLS\s0 258 then only cipher suites consistent with the security level are permissible. 267 Some restrictions can be gracefully handled: for example cipher suites
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_ssl.h | 49 * The `BR_TLS_*` constants correspond to the standard cipher suites and 825 * Maximum number of cipher suites supported by a client or server. 956 * Supported minimum and maximum versions, and cipher suites. 1258 * \brief Set the list of cipher suites advertised by this context. 1261 * responsibility to ensure that all provided suites will be supported 1263 * suites supported by the implementation. The provided array MUST NOT 1273 * \param suites cipher suites. 1274 * \param suites_num number of cipher suites. 1277 const uint16_t *suites, size_t suites_num); 1657 * cipher suites, and for ECDSA support. [all …]
|