| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 70-test_tls13downgrade.t | 72 my $ciphers = "AES128-SHA:\@SECLEVEL=0"; 79 $proxy->ciphers($ciphers); 88 $proxy->ciphers($ciphers); 98 $proxy->ciphers($ciphers); 107 $proxy->ciphers($ciphers); 116 $proxy->ciphers($ciphers);
|
| H A D | 20-test_enc_more.t | 35 my @ciphers = 40 @ciphers = grep {!/^-(bf|blowfish|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb 41 |desx|idea|rc2|rc4|seed)/x} @ciphers 44 plan tests => 2 + scalar @ciphers; 47 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 51 skip "Not initialized, skipping...", scalar(@ciphers); 54 foreach my $cipher (@ciphers) {
|
| H A D | 20-test_enc.t | 36 my @ciphers = 40 @ciphers = grep {!/^(bf|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb|desx|idea 41 |rc2|rc4|seed)/x} @ciphers 44 plan tests => 5 + (scalar @ciphers)*2; 47 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 51 skip "Not initialized, skipping...", scalar(@ciphers); 54 foreach my $c (@ciphers) {
|
| H A D | 70-test_sslsigalgs.t | 165 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 181 $proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=0"); 191 $proxy->ciphers("DEFAULT:\@SECLEVEL=1"); 201 $proxy->ciphers("DEFAULT:\@SECLEVEL=0"); 209 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 217 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 226 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 234 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 245 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 253 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_set_cipher_list.pod | 28 SSL_CTX_set_cipher_list() sets the list of available ciphers (TLSv1.2 and below) 30 in L<openssl-ciphers(1)>. The list of ciphers is inherited by all 34 SSL_set_cipher_list() sets the list of ciphers (TLSv1.2 and below) only for 67 (and earlier) ciphers. OSSL_default_ciphersuites() returns the default 74 usable and not depend on details of the library configuration (ciphers compiled 76 the corresponding ciphers are not compiled in or because they are mistyped, 77 are simply ignored. Failure is only flagged if no ciphers could be collected 83 additional restrictions apply. All ciphers have additional requirements. 84 ADH ciphers don't need a certificate, but DH-parameters must have been set. 85 All other ciphers need a corresponding certificate and key. [all …]
|
| H A D | SSL_get_ciphers.pod | 31 sorted by preference. If B<ssl> is NULL or no ciphers are available, NULL 40 SRP and PSK ciphers are only enabled if the appropriate callbacks or settings 42 The list of ciphers that would be sent in a ClientHello can differ from 43 the list of ciphers that would be acceptable when acting as a server. 44 For example, additional ciphers may be usable by a server if there is 45 a gap in the list of supported protocols, and some ciphers may not be 47 If B<ssl> is NULL or no ciphers are available, NULL is returned. 50 list received from the client on B<ssl>. If B<ssl> is NULL, no ciphers are 62 listed for B<ssl> with B<priority>. If B<ssl> is NULL, no ciphers are 63 available, or there are less ciphers than B<priority> available, NULL [all …]
|
| H A D | OpenSSL_add_all_algorithms.pod | 24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses 25 this table to lookup ciphers via functions such as EVP_get_cipher_byname(). 30 ciphers). 35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
|
| /freebsd/crypto/openssl/crypto/engine/ |
| H A D | tb_cipher.c | 29 if (e->ciphers) { in ENGINE_register_ciphers() 31 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers() 50 if (e->ciphers) { in ENGINE_set_default_ciphers() 52 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers() 87 return e->ciphers; in ENGINE_get_ciphers() 93 e->ciphers = f; in ENGINE_set_ciphers()
|
| /freebsd/crypto/openssh/regress/ |
| H A D | ssh-com.sh | 90 ciphers="3des-cbc" 94 ciphers="$ciphers cast128-cbc" 98 ciphers="$ciphers aes128-cbc cast128-cbc" 104 for c in $ciphers; do
|
| H A D | dropbear-ciphers.sh | 17 ciphers=`$DBCLIENT -c help hst 2>&1 | awk '/ ciphers: /{print $4}' | tr ',' ' '` 19 if [ -z "$macs" ] || [ -z "$ciphers" ]; then 20 skip "dbclient query ciphers '$ciphers' or macs '$macs' failed" 24 for c in $ciphers ; do
|
| H A D | putty-ciphers.sh | 23 ciphers="" 26 ciphers="${ciphers} ${c}" 32 for c in default $ciphers; do
|
| H A D | cipher-speed.sh | 7 ciphers=`${SSH} -Q Ciphers | tr '\n' , | sed 's/,$//'` 10 Ciphers $ciphers
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-ciphers.pod.in | 6 openssl-ciphers - SSL cipher display and cipher list command 10 B<openssl> B<ciphers> 46 Only list supported ciphers: those consistent with the security level, and 50 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp> 55 On a server the list of supported ciphers might also exclude other ciphers 58 If this option is not used then all ciphers that match the cipherlist will be 81 In combination with the B<-s> option, list the ciphers which could be used if 126 cipher suites of a certain type. For example B<SHA1> represents all ciphers 138 If B<!> is used then the ciphers are permanently deleted from the list. 139 The ciphers deleted can never reappear in the list even if they are [all …]
|
| H A D | openssl-enc.pod.in | 14 [B<-ciphers>] 52 using various block and stream ciphers using keys based on passwords 70 List all supported ciphers. 72 =item B<-ciphers> 74 Alias of -list to display all supported ciphers. 252 engine-provided ciphers, because this form is processed before the 254 Use the L<openssl-list(1)> command to get a list of supported ciphers. 260 ciphers which are supported by the OpenSSL core or another engine specified 263 When the enc command lists supported ciphers, ciphers provided by engines, 281 Some of the ciphers do not have large keys and others have security [all …]
|
| /freebsd/crypto/openssl/providers/ |
| H A D | fips.module.sources | 624 providers/implementations/ciphers/cipher_aes.c 625 providers/implementations/ciphers/cipher_aes.h 626 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha.c 627 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha.h 628 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha1_hw.c 629 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c 630 providers/implementations/ciphers/cipher_aes_ccm.c 631 providers/implementations/ciphers/cipher_aes_ccm.h 632 providers/implementations/ciphers/cipher_aes_ccm_hw.c 633 providers/implementations/ciphers/cipher_aes_ccm_hw_aesni.inc [all …]
|
| H A D | fips-sources.checksums | 624 c2f1b12c64fc369dfc3b9bc9e76a76de7280e6429adaee55d332eb1971ad1879 providers/implementations/ciphers… 625 6ba7d817081cf0d87ba7bfb38cd9d70e41505480bb8bc796ef896f68d4514ea6 providers/implementations/ciphers… 626 693a3a667bf13d3703601dc4d1daca9d890ca4f193ba26b8d77571f79507de16 providers/implementations/ciphers… 627 1b4f19be0c2bbea99e5fce0f93189c687a03cac634f0e37a51466ee7e3510735 providers/implementations/ciphers… 628 a579a933e7756b502510a42679e06dca2737bda9e53edda578e28eae56b98577 providers/implementations/ciphers… 629 4e5e5c6478cf72f6840aa5d9edc50fe27aaa3ea39a428f602056172b0f00d541 providers/implementations/ciphers… 630 1b6d31811a6729f0c75c7c7ccfb7d3a75ab6001605b229593187918a592da789 providers/implementations/ciphers… 631 00f36bf48e522dbb5ec71df0ec13e387955fa3672e6ff90e8a412ae95c4a642f providers/implementations/ciphers… 632 8049497bb1a3a6d5549d25ab31cf43afdf2e97ca789caed6502c19da3be44ae8 providers/implementations/ciphers… 633 302b3819ff9fdfed750185421616b248b0e1233d75b45a065490fe4762b42f55 providers/implementations/ciphers… [all …]
|
| /freebsd/crypto/openssl/test/ |
| H A D | cipherlist_test.c | 149 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist() 158 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist() 162 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist() 168 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist() 178 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist()
|
| H A D | dtls_mtu_test.c | 151 STACK_OF(SSL_CIPHER) *ciphers; in run_mtu_tests() 169 ciphers = SSL_CTX_get_ciphers(ctx); in run_mtu_tests() 170 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in run_mtu_tests() 171 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in run_mtu_tests()
|
| H A D | sslcorrupttest.c | 188 STACK_OF(SSL_CIPHER) *ciphers; in test_ssl_corrupt() 205 || !TEST_ptr(ciphers = SSL_CTX_get_ciphers(cctx)) in test_ssl_corrupt() 206 || !TEST_int_eq(sk_SSL_CIPHER_num(ciphers), 1) in test_ssl_corrupt() 207 || !TEST_ptr(currcipher = sk_SSL_CIPHER_value(ciphers, 0))) in test_ssl_corrupt()
|
| /freebsd/sys/dev/qat/qat_api/common/ctrl/ |
| H A D | sal_crypto.c | 1345 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_NULL); in cpaCySymQueryCapabilities() 1346 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_ECB); in cpaCySymQueryCapabilities() 1347 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_CBC); in cpaCySymQueryCapabilities() 1348 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_CTR); in cpaCySymQueryCapabilities() 1349 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_CCM); in cpaCySymQueryCapabilities() 1350 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_GCM); in cpaCySymQueryCapabilities() 1351 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_XTS); in cpaCySymQueryCapabilities() 1353 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_ARC4); in cpaCySymQueryCapabilities() 1354 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities() 1356 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities() [all …]
|
| /freebsd/sys/net80211/ |
| H A D | ieee80211_crypto.c | 56 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable 144 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none; in ieee80211_crypto_attach() 268 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { in ieee80211_crypto_register() 273 ciphers[cip->ic_cipher] = cip; in ieee80211_crypto_register() 287 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { in ieee80211_crypto_unregister() 294 ciphers[cip->ic_cipher] = NULL; in ieee80211_crypto_unregister() 300 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL; in ieee80211_crypto_available() 359 cip = ciphers[cipher]; in ieee80211_crypto_newkey() 376 cip = ciphers[cipher]; in ieee80211_crypto_newkey()
|
| /freebsd/crypto/openssh/regress/unittests/kex/ |
| H A D | test_proposal.c | 91 char *prop[PROPOSAL_MAX], *kexalgs, *ciphers, *macs, *hkalgs; in kex_proposal_populate_tests() local 98 ciphers = cipher_alg_list(',', 0); in kex_proposal_populate_tests() 111 ciphers, macs, hkalgs, comp); in kex_proposal_populate_tests() 121 free(ciphers); in kex_proposal_populate_tests()
|
| /freebsd/crypto/openssl/apps/ |
| H A D | ciphers.c | 106 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local 181 ciphers = argv[0]; in ciphers_main() 214 if (ciphers != NULL) { in ciphers_main() 215 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in ciphers_main()
|
| /freebsd/crypto/openssl/util/perl/TLSProxy/ |
| H A D | Proxy.pm | 185 ciphers => "AES128-SHA", 230 $self->{ciphers} = "AES128-SHA"; 339 if ($self->ciphers ne "") { 340 $execcmd .= " -cipher ".$self->ciphers; 751 sub ciphers subroutine 755 $self->{ciphers} = shift; 757 return $self->{ciphers};
|
| /freebsd/contrib/wpa/src/common/ |
| H A D | wpa_common.c | 3109 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument 3113 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites() 3117 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites() 3121 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites() 3125 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites() 3129 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites() 3133 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites() 3142 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument 3146 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites() 3150 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites() [all …]
|