Home
last modified time | relevance | path

Searched refs:ciphers (Results 1 – 25 of 184) sorted by relevance

12345678

/freebsd/crypto/openssl/test/recipes/
H A D70-test_tls13downgrade.t72 my $ciphers = "AES128-SHA:\@SECLEVEL=0";
79 $proxy->ciphers($ciphers);
88 $proxy->ciphers($ciphers);
98 $proxy->ciphers($ciphers);
107 $proxy->ciphers($ciphers);
116 $proxy->ciphers($ciphers);
H A D20-test_enc_more.t35 my @ciphers =
40 @ciphers = grep {!/^-(bf|blowfish|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb
41 |desx|idea|rc2|rc4|seed)/x} @ciphers
44 plan tests => 2 + scalar @ciphers;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $cipher (@ciphers) {
H A D20-test_enc.t36 my @ciphers =
40 @ciphers = grep {!/^(bf|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb|desx|idea
41 |rc2|rc4|seed)/x} @ciphers
44 plan tests => 5 + (scalar @ciphers)*2;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $c (@ciphers) {
H A D70-test_sslsigalgs.t165 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
181 $proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=0");
191 $proxy->ciphers("DEFAULT:\@SECLEVEL=1");
201 $proxy->ciphers("DEFAULT:\@SECLEVEL=0");
209 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
217 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
226 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
234 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
245 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
253 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_cipher_list.pod28 SSL_CTX_set_cipher_list() sets the list of available ciphers (TLSv1.2 and below)
30 in L<openssl-ciphers(1)>. The list of ciphers is inherited by all
34 SSL_set_cipher_list() sets the list of ciphers (TLSv1.2 and below) only for
67 (and earlier) ciphers. OSSL_default_ciphersuites() returns the default
74 usable and not depend on details of the library configuration (ciphers compiled
76 the corresponding ciphers are not compiled in or because they are mistyped,
77 are simply ignored. Failure is only flagged if no ciphers could be collected
83 additional restrictions apply. All ciphers have additional requirements.
84 ADH ciphers don't need a certificate, but DH-parameters must have been set.
85 All other ciphers need a corresponding certificate and key.
[all …]
H A DSSL_get_ciphers.pod31 sorted by preference. If B<ssl> is NULL or no ciphers are available, NULL
40 SRP and PSK ciphers are only enabled if the appropriate callbacks or settings
42 The list of ciphers that would be sent in a ClientHello can differ from
43 the list of ciphers that would be acceptable when acting as a server.
44 For example, additional ciphers may be usable by a server if there is
45 a gap in the list of supported protocols, and some ciphers may not be
47 If B<ssl> is NULL or no ciphers are available, NULL is returned.
50 list received from the client on B<ssl>. If B<ssl> is NULL, no ciphers are
62 listed for B<ssl> with B<priority>. If B<ssl> is NULL, no ciphers are
63 available, or there are less ciphers than B<priority> available, NULL
[all …]
H A DOpenSSL_add_all_algorithms.pod24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses
25 this table to lookup ciphers via functions such as EVP_get_cipher_byname().
30 ciphers).
35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
/freebsd/crypto/openssl/crypto/engine/
H A Dtb_cipher.c29 if (e->ciphers) { in ENGINE_register_ciphers()
31 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers()
50 if (e->ciphers) { in ENGINE_set_default_ciphers()
52 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers()
87 return e->ciphers; in ENGINE_get_ciphers()
93 e->ciphers = f; in ENGINE_set_ciphers()
/freebsd/crypto/openssh/regress/
H A Dssh-com.sh90 ciphers="3des-cbc"
94 ciphers="$ciphers cast128-cbc"
98 ciphers="$ciphers aes128-cbc cast128-cbc"
104 for c in $ciphers; do
H A Ddropbear-ciphers.sh17 ciphers=`$DBCLIENT -c help hst 2>&1 | awk '/ ciphers: /{print $4}' | tr ',' ' '`
19 if [ -z "$macs" ] || [ -z "$ciphers" ]; then
20 skip "dbclient query ciphers '$ciphers' or macs '$macs' failed"
24 for c in $ciphers ; do
H A Dputty-ciphers.sh23 ciphers=""
26 ciphers="${ciphers} ${c}"
32 for c in default $ciphers; do
H A Dcipher-speed.sh7 ciphers=`${SSH} -Q Ciphers | tr '\n' , | sed 's/,$//'`
10 Ciphers $ciphers
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-ciphers.pod.in6 openssl-ciphers - SSL cipher display and cipher list command
10 B<openssl> B<ciphers>
46 Only list supported ciphers: those consistent with the security level, and
50 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp>
55 On a server the list of supported ciphers might also exclude other ciphers
58 If this option is not used then all ciphers that match the cipherlist will be
81 In combination with the B<-s> option, list the ciphers which could be used if
126 cipher suites of a certain type. For example B<SHA1> represents all ciphers
138 If B<!> is used then the ciphers are permanently deleted from the list.
139 The ciphers deleted can never reappear in the list even if they are
[all …]
H A Dopenssl-enc.pod.in14 [B<-ciphers>]
52 using various block and stream ciphers using keys based on passwords
70 List all supported ciphers.
72 =item B<-ciphers>
74 Alias of -list to display all supported ciphers.
252 engine-provided ciphers, because this form is processed before the
254 Use the L<openssl-list(1)> command to get a list of supported ciphers.
260 ciphers which are supported by the OpenSSL core or another engine specified
263 When the enc command lists supported ciphers, ciphers provided by engines,
281 Some of the ciphers do not have large keys and others have security
[all …]
/freebsd/crypto/openssl/providers/
H A Dfips.module.sources624 providers/implementations/ciphers/cipher_aes.c
625 providers/implementations/ciphers/cipher_aes.h
626 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha.c
627 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha.h
628 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha1_hw.c
629 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
630 providers/implementations/ciphers/cipher_aes_ccm.c
631 providers/implementations/ciphers/cipher_aes_ccm.h
632 providers/implementations/ciphers/cipher_aes_ccm_hw.c
633 providers/implementations/ciphers/cipher_aes_ccm_hw_aesni.inc
[all …]
H A Dfips-sources.checksums624 c2f1b12c64fc369dfc3b9bc9e76a76de7280e6429adaee55d332eb1971ad1879 providers/implementations/ciphers
625 6ba7d817081cf0d87ba7bfb38cd9d70e41505480bb8bc796ef896f68d4514ea6 providers/implementations/ciphers
626 693a3a667bf13d3703601dc4d1daca9d890ca4f193ba26b8d77571f79507de16 providers/implementations/ciphers
627 1b4f19be0c2bbea99e5fce0f93189c687a03cac634f0e37a51466ee7e3510735 providers/implementations/ciphers
628 a579a933e7756b502510a42679e06dca2737bda9e53edda578e28eae56b98577 providers/implementations/ciphers
629 4e5e5c6478cf72f6840aa5d9edc50fe27aaa3ea39a428f602056172b0f00d541 providers/implementations/ciphers
630 1b6d31811a6729f0c75c7c7ccfb7d3a75ab6001605b229593187918a592da789 providers/implementations/ciphers
631 00f36bf48e522dbb5ec71df0ec13e387955fa3672e6ff90e8a412ae95c4a642f providers/implementations/ciphers
632 8049497bb1a3a6d5549d25ab31cf43afdf2e97ca789caed6502c19da3be44ae8 providers/implementations/ciphers
633 302b3819ff9fdfed750185421616b248b0e1233d75b45a065490fe4762b42f55 providers/implementations/ciphers
[all …]
/freebsd/crypto/openssl/test/
H A Dcipherlist_test.c149 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist()
158 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist()
162 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist()
168 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist()
178 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist()
H A Ddtls_mtu_test.c151 STACK_OF(SSL_CIPHER) *ciphers; in run_mtu_tests()
169 ciphers = SSL_CTX_get_ciphers(ctx); in run_mtu_tests()
170 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in run_mtu_tests()
171 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in run_mtu_tests()
H A Dsslcorrupttest.c188 STACK_OF(SSL_CIPHER) *ciphers; in test_ssl_corrupt()
205 || !TEST_ptr(ciphers = SSL_CTX_get_ciphers(cctx)) in test_ssl_corrupt()
206 || !TEST_int_eq(sk_SSL_CIPHER_num(ciphers), 1) in test_ssl_corrupt()
207 || !TEST_ptr(currcipher = sk_SSL_CIPHER_value(ciphers, 0))) in test_ssl_corrupt()
/freebsd/sys/dev/qat/qat_api/common/ctrl/
H A Dsal_crypto.c1345 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_NULL); in cpaCySymQueryCapabilities()
1346 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_ECB); in cpaCySymQueryCapabilities()
1347 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_CBC); in cpaCySymQueryCapabilities()
1348 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_CTR); in cpaCySymQueryCapabilities()
1349 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_CCM); in cpaCySymQueryCapabilities()
1350 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_GCM); in cpaCySymQueryCapabilities()
1351 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_XTS); in cpaCySymQueryCapabilities()
1353 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_ARC4); in cpaCySymQueryCapabilities()
1354 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities()
1356 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities()
[all …]
/freebsd/sys/net80211/
H A Dieee80211_crypto.c56 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable
144 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none; in ieee80211_crypto_attach()
268 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { in ieee80211_crypto_register()
273 ciphers[cip->ic_cipher] = cip; in ieee80211_crypto_register()
287 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { in ieee80211_crypto_unregister()
294 ciphers[cip->ic_cipher] = NULL; in ieee80211_crypto_unregister()
300 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL; in ieee80211_crypto_available()
359 cip = ciphers[cipher]; in ieee80211_crypto_newkey()
376 cip = ciphers[cipher]; in ieee80211_crypto_newkey()
/freebsd/crypto/openssh/regress/unittests/kex/
H A Dtest_proposal.c91 char *prop[PROPOSAL_MAX], *kexalgs, *ciphers, *macs, *hkalgs; in kex_proposal_populate_tests() local
98 ciphers = cipher_alg_list(',', 0); in kex_proposal_populate_tests()
111 ciphers, macs, hkalgs, comp); in kex_proposal_populate_tests()
121 free(ciphers); in kex_proposal_populate_tests()
/freebsd/crypto/openssl/apps/
H A Dciphers.c106 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local
181 ciphers = argv[0]; in ciphers_main()
214 if (ciphers != NULL) { in ciphers_main()
215 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in ciphers_main()
/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DProxy.pm185 ciphers => "AES128-SHA",
230 $self->{ciphers} = "AES128-SHA";
339 if ($self->ciphers ne "") {
340 $execcmd .= " -cipher ".$self->ciphers;
751 sub ciphers subroutine
755 $self->{ciphers} = shift;
757 return $self->{ciphers};
/freebsd/contrib/wpa/src/common/
H A Dwpa_common.c3109 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument
3113 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites()
3117 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites()
3121 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites()
3125 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites()
3129 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites()
3133 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites()
3142 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument
3146 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites()
3150 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites()
[all …]

12345678