Home
last modified time | relevance | path

Searched full:suites (Results 1 – 25 of 136) sorted by relevance

123456

/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-ciphers.pod.in64 When combined with B<-s> includes cipher suites which require PSK.
68 When combined with B<-s> includes cipher suites which require SRP. This option
122 It can represent a list of cipher suites containing a certain algorithm, or
123 cipher suites of a certain type. For example B<SHA1> represents all ciphers
124 suites using the digest algorithm SHA1 and B<SSLv3> represents all SSL v3
127 Lists of cipher suites can be combined in a single cipher string using the
129 B<SHA1+DES> represents all cipher suites containing the SHA1 B<and> the DES
176 necessary). Note that RC4 based cipher suites are not built into OpenSSL by
181 All cipher suites except the B<eNULL> ciphers (which must be explicitly enabled
183 As of OpenSSL 1.0.0, the B<ALL> cipher suites are sensibly ordered by default.
[all …]
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-ciphers.1200 When combined with \fB\-s\fR includes cipher suites which require \s-1PSK.\s0
203 When combined with \fB\-s\fR includes cipher suites which require \s-1SRP.\s0 This option
249 It can represent a list of cipher suites containing a certain algorithm, or
250 cipher suites of a certain type. For example \fB\s-1SHA1\s0\fR represents all ciphers
251 suites using the digest algorithm \s-1SHA1\s0 and \fBSSLv3\fR represents all \s-1SSL\s0 v3
254 Lists of cipher suites can be combined in a single cipher string using the
256 \&\fB\s-1SHA1+DES\s0\fR represents all cipher suites containing the \s-1SHA1\s0 \fBand\fR the \s-1D…
299 necessary). Note that \s-1RC4\s0 based cipher suites are not built into OpenSSL by
303 All cipher suites except the \fBeNULL\fR ciphers (which must be explicitly enabled
305 As of OpenSSL 1.0.0, the \fB\s-1ALL\s0\fR cipher suites are sensibly ordered by default.
[all …]
/freebsd/contrib/bearssl/samples/
H A Dcustom_profile.c29 * configures a list of cipher suites and algorithm implementations.
38 * supported (protocol versions and cipher suites).
51 * A list of cipher suites, by preference (first is most in example_client_profile()
52 * preferred). The list below contains all cipher suites supported in example_client_profile()
55 static const uint16_t suites[] = { in example_client_profile() local
114 * -- cipher suites with a name ending in "SHA384" need "prf_sha384"; in example_client_profile()
131 * -- With TLS 1.2, cipher suites with a name ending in "SHA384" in example_client_profile()
133 * -- With TLS 1.2, cipher suites with a name ending in "SHA256" in example_client_profile()
135 * -- With TLS 1.2, cipher suites with a name ending in "SHA" in example_client_profile()
140 * cipher suites), and on the client side (for client in example_client_profile()
[all …]
/freebsd/contrib/wpa/src/tls/
H A Dtlsv1_client.c469 u16 *suites; in tlsv1_client_init() local
485 suites = conn->cipher_suites; in tlsv1_client_init()
486 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA256; in tlsv1_client_init()
487 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA256; in tlsv1_client_init()
488 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA; in tlsv1_client_init()
489 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA; in tlsv1_client_init()
490 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA256; in tlsv1_client_init()
491 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA256; in tlsv1_client_init()
492 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA; in tlsv1_client_init()
493 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA; in tlsv1_client_init()
[all …]
H A Dtlsv1_server.c381 u16 *suites; in tlsv1_server_init() local
399 suites = conn->cipher_suites; in tlsv1_server_init()
400 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA256; in tlsv1_server_init()
401 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA256; in tlsv1_server_init()
402 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA; in tlsv1_server_init()
403 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA; in tlsv1_server_init()
404 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA256; in tlsv1_server_init()
405 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA256; in tlsv1_server_init()
406 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA; in tlsv1_server_init()
407 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA; in tlsv1_server_init()
[all …]
/freebsd/contrib/bearssl/src/ssl/
H A Dssl_server_full_ec.c34 * The "full" profile supports all implemented cipher suites. in br_ssl_server_init_full_ec()
47 * Note that for ECDH suites, the list will be automatically in br_ssl_server_init_full_ec()
50 static const uint16_t suites[] = { in br_ssl_server_init_full_ec() local
103 * Set suites and elliptic curve implementation (for ECDHE). in br_ssl_server_init_full_ec()
105 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_full_ec()
106 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_full_ec()
H A Dssl_server_full_rsa.c34 * The "full" profile supports all implemented cipher suites. in br_ssl_server_init_full_rsa()
46 static const uint16_t suites[] = { in br_ssl_server_init_full_rsa() local
92 * Set suites and elliptic curve implementation (for ECDHE). in br_ssl_server_init_full_rsa()
94 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_full_rsa()
95 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_full_rsa()
H A Dssl_server_mine2c.c33 static const uint16_t suites[] = { in br_ssl_server_init_mine2c() local
44 * Set suites and elliptic curve implementation (for ECDHE). in br_ssl_server_init_mine2c()
46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_mine2c()
47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_mine2c()
H A Dssl_server_mine2g.c33 static const uint16_t suites[] = { in br_ssl_server_init_mine2g() local
44 * Set suites and elliptic curve implementation (for ECDHE). in br_ssl_server_init_mine2g()
46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_mine2g()
47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_mine2g()
H A Dssl_server_minf2c.c33 static const uint16_t suites[] = { in br_ssl_server_init_minf2c() local
44 * Set suites and elliptic curve implementation (for ECDHE). in br_ssl_server_init_minf2c()
46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minf2c()
47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minf2c()
H A Dssl_server_minf2g.c33 static const uint16_t suites[] = { in br_ssl_server_init_minf2g() local
44 * Set suites and elliptic curve implementation (for ECDHE). in br_ssl_server_init_minf2g()
46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minf2g()
47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minf2g()
H A Dssl_server_minr2g.c33 static const uint16_t suites[] = { in br_ssl_server_init_minr2g() local
44 * Set suites. in br_ssl_server_init_minr2g()
46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minr2g()
47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minr2g()
H A Dssl_server_minu2g.c33 static const uint16_t suites[] = { in br_ssl_server_init_minu2g() local
44 * Set suites. in br_ssl_server_init_minu2g()
46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minu2g()
47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minu2g()
H A Dssl_server_minv2g.c33 static const uint16_t suites[] = { in br_ssl_server_init_minv2g() local
44 * Set suites. in br_ssl_server_init_minv2g()
46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minv2g()
47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minv2g()
H A Dssl_client_full.c34 * The "full" profile supports all implemented cipher suites. in br_ssl_client_init_full()
52 static const uint16_t suites[] = { in br_ssl_client_init_full() local
131 * Set suites and asymmetric crypto implementations. We use the in br_ssl_client_init_full()
136 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_client_init_full()
137 (sizeof suites) / (sizeof suites[0])); in br_ssl_client_init_full()
/freebsd/contrib/bearssl/tools/
H A Dtwrch.c83 " -cs names set list of supported cipher suites (comma-separated)\n"); in usage_twrch()
89 " -serverpref enforce server's preferences for cipher suites\n"); in usage_twrch()
247 cipher_suite *suites; in do_twrch() local
282 suites = NULL; in do_twrch()
475 if (suites != NULL) { in do_twrch()
477 " of cipher suites\n"); in do_twrch()
481 suites = parse_suites(arg, &num_suites); in do_twrch()
482 if (suites == NULL) { in do_twrch()
602 if (suites == NULL) { in do_twrch()
612 suites = xmalloc(num_suites * sizeof *suites); in do_twrch()
[all …]
H A Dclient.c492 " -cs names set list of supported cipher suites (comma-separated)\n"); in usage_client()
522 cipher_suite *suites; in do_client() local
553 suites = NULL; in do_client()
733 if (suites != NULL) { in do_client()
735 " of cipher suites\n"); in do_client()
739 suites = parse_suites(arg, &num_suites); in do_client()
740 if (suites == NULL) { in do_client()
857 if (suites == NULL) { in do_client()
867 suites = xmalloc(num_suites * sizeof *suites); in do_client()
873 suites[num_suites ++] = cipher_suites[u]; in do_client()
[all …]
H A Dserver.c261 " -cs names set list of supported cipher suites (comma-separated)\n"); in usage_server()
267 " -serverpref enforce server's preferences for cipher suites\n"); in usage_server()
361 fprintf(stderr, " Compatible cipher suites:\n"); in sp_choose()
636 cipher_suite *suites; in do_server() local
666 suites = NULL; in do_server()
866 if (suites != NULL) { in do_server()
868 " of cipher suites\n"); in do_server()
872 suites = parse_suites(arg, &num_suites); in do_server()
873 if (suites == NULL) { in do_server()
930 if (suites == NULL) { in do_server()
[all …]
/freebsd/crypto/openssl/test/
H A DREADME-external.md1 Running external test suites with OpenSSL
4 It is possible to integrate external test suites into OpenSSL's `make test`.
90 Updating test suites
93 To update the commit for any of the above test suites:
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_security_level.pod78 are prohibited. All export cipher suites are prohibited since they all offer
95 In addition to the level 2 exclusions cipher suites not offering forward
103 prohibited. Cipher suites using SHA1 for the MAC are prohibited. TLS
136 then only cipher suites consistent with the security level are permissible.
145 Some restrictions can be gracefully handled: for example cipher suites
H A DSSL_CIPHER_get_name.pod64 If there is no cipher (e.g. for cipher suites with no encryption) then
69 for AEAD cipher suites) then B<NID_undef> is returned.
78 cipher suites) B<NID_kx_any> is returned. Examples (not comprehensive):
88 TLS 1.3 cipher suites) B<NID_auth_any> is returned. Examples (not comprehensive):
/freebsd/contrib/kyua/doc/
H A Dkyuafile.5.in321 Every system has a top directory into which test suites get installed.
324 Within this directory live test suites, each of which is in an independent
329 Kyua allows running all the installed test suites at once in order to
462 .Ss Connecting disjoint test suites
463 Now suppose you had various test suites on your file system and you would
466 The test suites we would like to connect live under
/freebsd/contrib/googletest/docs/
H A Dprimer.md19 code. GoogleTest groups related tests into test suites that can share data
90 suites that reflect the structure of the tested code. When multiple tests in a
94 A *test program* can contain multiple test suites.
97 assertion level and building up to tests and test suites.
167 and its individual name. Tests from different test suites can have the same
193 GoogleTest groups the test results by test suites, so logically related tests
199 When naming your test suites and tests, you should follow the same convention as
346 test suites, or even different source files.
387 cannot be expressed within the framework of fixtures and test suites.
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_CTX_set_security_level.3208 are prohibited. All export cipher suites are prohibited since they all offer
223 In addition to the level 2 exclusions cipher suites not offering forward
230 prohibited. Cipher suites using \s-1SHA1\s0 for the \s-1MAC\s0 are prohibited. \s-1TLS\s0
258 then only cipher suites consistent with the security level are permissible.
267 Some restrictions can be gracefully handled: for example cipher suites
/freebsd/contrib/bearssl/inc/
H A Dbearssl_ssl.h49 * The `BR_TLS_*` constants correspond to the standard cipher suites and
825 * Maximum number of cipher suites supported by a client or server.
956 * Supported minimum and maximum versions, and cipher suites.
1258 * \brief Set the list of cipher suites advertised by this context.
1261 * responsibility to ensure that all provided suites will be supported
1263 * suites supported by the implementation. The provided array MUST NOT
1273 * \param suites cipher suites.
1274 * \param suites_num number of cipher suites.
1277 const uint16_t *suites, size_t suites_num);
1657 * cipher suites, and for ECDSA support.
[all …]

123456