Home
last modified time | relevance | path

Searched refs:ciphers (Results 1 – 25 of 171) sorted by relevance

1234567

/freebsd/crypto/openssl/test/recipes/
H A D20-test_enc_more.t35 my @ciphers =
40 @ciphers = grep {!/^-(bf|blowfish|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb
41 |desx|idea|rc2|rc4|seed)/x} @ciphers
44 plan tests => 2 + scalar @ciphers;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $cipher (@ciphers) {
H A D20-test_enc.t36 my @ciphers =
40 @ciphers = grep {!/^(bf|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb|desx|idea
41 |rc2|rc4|seed)/x} @ciphers
44 plan tests => 2 + (scalar @ciphers)*2;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $c (@ciphers) {
H A D70-test_sslsigalgs.t132 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
148 $proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=0");
158 $proxy->ciphers("DEFAULT:\@SECLEVEL=1");
168 $proxy->ciphers("DEFAULT:\@SECLEVEL=0");
176 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
184 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
193 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
201 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
212 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
220 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
[all …]
H A D70-test_sslrecords.t100 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
111 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
122 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
132 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
142 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
164 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_cipher_list.pod28 SSL_CTX_set_cipher_list() sets the list of available ciphers (TLSv1.2 and below)
30 in L<openssl-ciphers(1)>. The list of ciphers is inherited by all
34 SSL_set_cipher_list() sets the list of ciphers (TLSv1.2 and below) only for
63 (and earlier) ciphers. OSSL_default_ciphersuites() returns the default
70 usable and not depend on details of the library configuration (ciphers compiled
72 the corresponding ciphers are not compiled in or because they are mistyped,
73 are simply ignored. Failure is only flagged if no ciphers could be collected
79 additional restrictions apply. All ciphers have additional requirements.
80 ADH ciphers don't need a certificate, but DH-parameters must have been set.
81 All other ciphers need a corresponding certificate and key.
[all …]
H A DSSL_get_ciphers.pod31 sorted by preference. If B<ssl> is NULL or no ciphers are available, NULL
40 SRP and PSK ciphers are only enabled if the appropriate callbacks or settings
42 The list of ciphers that would be sent in a ClientHello can differ from
43 the list of ciphers that would be acceptable when acting as a server.
44 For example, additional ciphers may be usable by a server if there is
45 a gap in the list of supported protocols, and some ciphers may not be
47 If B<ssl> is NULL or no ciphers are available, NULL is returned.
50 list received from the client on B<ssl>. If B<ssl> is NULL, no ciphers are
62 listed for B<ssl> with B<priority>. If B<ssl> is NULL, no ciphers are
63 available, or there are less ciphers than B<priority> available, NULL
[all …]
H A DOpenSSL_add_all_algorithms.pod24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses
25 this table to lookup ciphers via functions such as EVP_get_cipher_byname().
30 ciphers).
35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
/freebsd/crypto/openssl/crypto/engine/
H A Dtb_cipher.c29 if (e->ciphers) { in ENGINE_register_ciphers()
31 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers()
50 if (e->ciphers) { in ENGINE_set_default_ciphers()
52 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers()
87 return e->ciphers; in ENGINE_get_ciphers()
93 e->ciphers = f; in ENGINE_set_ciphers()
/freebsd/crypto/openssh/regress/
H A Dssh-com.sh90 ciphers="3des-cbc"
94 ciphers="$ciphers cast128-cbc"
98 ciphers="$ciphers aes128-cbc cast128-cbc"
104 for c in $ciphers; do
H A Ddropbear-ciphers.sh17 ciphers=`$DBCLIENT -c help hst 2>&1 | awk '/ ciphers: /{print $4}' | tr ',' ' '`
19 if [ -z "$macs" ] || [ -z "$ciphers" ]; then
20 skip "dbclient query ciphers '$ciphers' or macs '$macs' failed"
24 for c in $ciphers ; do
H A Dputty-ciphers.sh23 ciphers=""
26 ciphers="${ciphers} ${c}"
32 for c in default $ciphers; do
H A Dcipher-speed.sh7 ciphers=`${SSH} -Q Ciphers | tr '\n' , | sed 's/,$//'`
10 Ciphers $ciphers
/freebsd/crypto/openssl/providers/
H A Dfips.module.sources504 providers/implementations/ciphers/cipher_aes.c
505 providers/implementations/ciphers/cipher_aes.h
506 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha.c
507 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha.h
508 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha1_hw.c
509 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
510 providers/implementations/ciphers/cipher_aes_ccm.c
511 providers/implementations/ciphers/cipher_aes_ccm.h
512 providers/implementations/ciphers/cipher_aes_ccm_hw.c
513 providers/implementations/ciphers/cipher_aes_ccm_hw_aesni.inc
[all …]
H A Dfips-sources.checksums504 4db1826ecce8b60cb641bcd7a61430ec8cef73d2fe3cbc06aa33526afe1c954a providers/implementations/ciphers
505 6ba7d817081cf0d87ba7bfb38cd9d70e41505480bb8bc796ef896f68d4514ea6 providers/implementations/ciphers
506 aef500281e7cd5a25a806a9bd45ec00a5b73984673202527dac5896fbcc9fa9c providers/implementations/ciphers
507 7668e5c1cac474ad7b0f28aa78ca885edf44815fe4a606a6cd328b3c02fac25a providers/implementations/ciphers
508 26e0f28523b416ba4067e471061f5a11fd76f5dc8bfe57ce37a137cf5667630b providers/implementations/ciphers
509 6d2ab2e059ef38fad342d4c65eebd533c08a2092bb174ff3566c6604e175c5a4 providers/implementations/ciphers
510 f37c3cf9e2e6fcfcbed941f3670b790fe09990349db72eb065bef51705d46e96 providers/implementations/ciphers
511 00f36bf48e522dbb5ec71df0ec13e387955fa3672e6ff90e8a412ae95c4a642f providers/implementations/ciphers
512 6337b570e0dc4e98af07aa9704254d3ab958cf605584e250fbd76cd1d2a25ac7 providers/implementations/ciphers
513 302b3819ff9fdfed750185421616b248b0e1233d75b45a065490fe4762b42f55 providers/implementations/ciphers
[all …]
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-ciphers.pod.in6 openssl-ciphers - SSL cipher display and cipher list command
10 B<openssl> B<ciphers>
47 Only list supported ciphers: those consistent with the security level, and
51 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp>
56 On a server the list of supported ciphers might also exclude other ciphers
59 If this option is not used then all ciphers that match the cipherlist will be
82 In combination with the B<-s> option, list the ciphers which could be used if
123 cipher suites of a certain type. For example B<SHA1> represents all ciphers
135 If B<!> is used then the ciphers are permanently deleted from the list.
136 The ciphers deleted can never reappear in the list even if they are
[all …]
H A Dopenssl-enc.pod.in14 [B<-ciphers>]
49 using various block and stream ciphers using keys based on passwords
67 List all supported ciphers.
69 =item B<-ciphers>
71 Alias of -list to display all supported ciphers.
221 engine-provided ciphers, because this form is processed before the
223 Use the L<openssl-list(1)> command to get a list of supported ciphers.
229 ciphers which are supported by the OpenSSL core or another engine specified
232 When the enc command lists supported ciphers, ciphers provided by engines,
250 Some of the ciphers do not have large keys and others have security
[all …]
/freebsd/crypto/openssl/test/
H A Dcipherlist_test.c150 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist()
159 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist()
163 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist()
169 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist()
179 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist()
H A Ddtls_mtu_test.c147 STACK_OF(SSL_CIPHER) *ciphers; in run_mtu_tests()
165 ciphers = SSL_CTX_get_ciphers(ctx); in run_mtu_tests()
166 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in run_mtu_tests()
167 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in run_mtu_tests()
H A Dsslcorrupttest.c189 STACK_OF(SSL_CIPHER) *ciphers; in test_ssl_corrupt()
206 || !TEST_ptr(ciphers = SSL_CTX_get_ciphers(cctx)) in test_ssl_corrupt()
207 || !TEST_int_eq(sk_SSL_CIPHER_num(ciphers), 1) in test_ssl_corrupt()
208 || !TEST_ptr(currcipher = sk_SSL_CIPHER_value(ciphers, 0))) in test_ssl_corrupt()
/freebsd/sys/net80211/
H A Dieee80211_crypto.c56 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable
144 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none; in ieee80211_crypto_attach()
268 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { in ieee80211_crypto_register()
273 ciphers[cip->ic_cipher] = cip; in ieee80211_crypto_register()
287 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { in ieee80211_crypto_unregister()
294 ciphers[cip->ic_cipher] = NULL; in ieee80211_crypto_unregister()
300 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL; in ieee80211_crypto_available()
359 cip = ciphers[cipher]; in ieee80211_crypto_newkey()
376 cip = ciphers[cipher]; in ieee80211_crypto_newkey()
/freebsd/crypto/openssh/regress/unittests/kex/
H A Dtest_proposal.c91 char *prop[PROPOSAL_MAX], *kexalgs, *ciphers, *macs, *hkalgs; in kex_proposal_populate_tests() local
98 ciphers = cipher_alg_list(',', 0); in kex_proposal_populate_tests()
111 ciphers, macs, hkalgs, comp); in kex_proposal_populate_tests()
121 free(ciphers); in kex_proposal_populate_tests()
/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DProxy.pm103 ciphers => "AES128-SHA",
171 $self->{ciphers} = "AES128-SHA";
234 if ($self->ciphers ne "") {
235 $execcmd .= " -cipher ".$self->ciphers;
624 sub ciphers subroutine
628 $self->{ciphers} = shift;
630 return $self->{ciphers};
/freebsd/sys/dev/qat/qat_api/common/ctrl/
H A Dsal_crypto.c1535 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_NULL); in cpaCySymQueryCapabilities()
1536 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_ECB); in cpaCySymQueryCapabilities()
1537 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_CBC); in cpaCySymQueryCapabilities()
1538 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_CTR); in cpaCySymQueryCapabilities()
1539 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_CCM); in cpaCySymQueryCapabilities()
1540 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_GCM); in cpaCySymQueryCapabilities()
1541 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_XTS); in cpaCySymQueryCapabilities()
1543 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_ARC4); in cpaCySymQueryCapabilities()
1544 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities()
1546 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities()
[all …]
/freebsd/crypto/openssl/apps/
H A Dciphers.c103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local
179 ciphers = argv[0]; in ciphers_main()
212 if (ciphers != NULL) { in ciphers_main()
213 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in ciphers_main()
/freebsd/contrib/wpa/src/common/
H A Dwpa_common.c3109 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument
3113 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites()
3117 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites()
3121 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites()
3125 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites()
3129 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites()
3133 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites()
3142 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument
3146 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites()
3150 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites()
[all …]

1234567