/freebsd/crypto/openssl/test/recipes/ |
H A D | 20-test_enc_more.t | 35 my @ciphers = 40 @ciphers = grep {!/^-(bf|blowfish|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb 41 |desx|idea|rc2|rc4|seed)/x} @ciphers 44 plan tests => 2 + scalar @ciphers; 47 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 51 skip "Not initialized, skipping...", scalar(@ciphers); 54 foreach my $cipher (@ciphers) {
|
H A D | 20-test_enc.t | 36 my @ciphers = 40 @ciphers = grep {!/^(bf|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb|desx|idea 41 |rc2|rc4|seed)/x} @ciphers 44 plan tests => 2 + (scalar @ciphers)*2; 47 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 51 skip "Not initialized, skipping...", scalar(@ciphers); 54 foreach my $c (@ciphers) {
|
H A D | 70-test_sslsigalgs.t | 132 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 148 $proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=0"); 158 $proxy->ciphers("DEFAULT:\@SECLEVEL=1"); 168 $proxy->ciphers("DEFAULT:\@SECLEVEL=0"); 176 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 184 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 193 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 201 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 212 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 220 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); [all …]
|
H A D | 70-test_sslrecords.t | 100 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 111 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 122 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 132 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 142 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 164 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_cipher_list.pod | 28 SSL_CTX_set_cipher_list() sets the list of available ciphers (TLSv1.2 and below) 30 in L<openssl-ciphers(1)>. The list of ciphers is inherited by all 34 SSL_set_cipher_list() sets the list of ciphers (TLSv1.2 and below) only for 63 (and earlier) ciphers. OSSL_default_ciphersuites() returns the default 70 usable and not depend on details of the library configuration (ciphers compiled 72 the corresponding ciphers are not compiled in or because they are mistyped, 73 are simply ignored. Failure is only flagged if no ciphers could be collected 79 additional restrictions apply. All ciphers have additional requirements. 80 ADH ciphers don't need a certificate, but DH-parameters must have been set. 81 All other ciphers need a corresponding certificate and key. [all …]
|
H A D | SSL_get_ciphers.pod | 31 sorted by preference. If B<ssl> is NULL or no ciphers are available, NULL 40 SRP and PSK ciphers are only enabled if the appropriate callbacks or settings 42 The list of ciphers that would be sent in a ClientHello can differ from 43 the list of ciphers that would be acceptable when acting as a server. 44 For example, additional ciphers may be usable by a server if there is 45 a gap in the list of supported protocols, and some ciphers may not be 47 If B<ssl> is NULL or no ciphers are available, NULL is returned. 50 list received from the client on B<ssl>. If B<ssl> is NULL, no ciphers are 62 listed for B<ssl> with B<priority>. If B<ssl> is NULL, no ciphers are 63 available, or there are less ciphers than B<priority> available, NULL [all …]
|
H A D | OpenSSL_add_all_algorithms.pod | 24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses 25 this table to lookup ciphers via functions such as EVP_get_cipher_byname(). 30 ciphers). 35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
|
/freebsd/crypto/openssl/crypto/engine/ |
H A D | tb_cipher.c | 29 if (e->ciphers) { in ENGINE_register_ciphers() 31 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers() 50 if (e->ciphers) { in ENGINE_set_default_ciphers() 52 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers() 87 return e->ciphers; in ENGINE_get_ciphers() 93 e->ciphers = f; in ENGINE_set_ciphers()
|
/freebsd/crypto/openssh/regress/ |
H A D | ssh-com.sh | 90 ciphers="3des-cbc" 94 ciphers="$ciphers cast128-cbc" 98 ciphers="$ciphers aes128-cbc cast128-cbc" 104 for c in $ciphers; do
|
H A D | dropbear-ciphers.sh | 17 ciphers=`$DBCLIENT -c help hst 2>&1 | awk '/ ciphers: /{print $4}' | tr ',' ' '` 19 if [ -z "$macs" ] || [ -z "$ciphers" ]; then 20 skip "dbclient query ciphers '$ciphers' or macs '$macs' failed" 24 for c in $ciphers ; do
|
H A D | putty-ciphers.sh | 23 ciphers="" 26 ciphers="${ciphers} ${c}" 32 for c in default $ciphers; do
|
H A D | cipher-speed.sh | 7 ciphers=`${SSH} -Q Ciphers | tr '\n' , | sed 's/,$//'` 10 Ciphers $ciphers
|
/freebsd/crypto/openssl/providers/ |
H A D | fips.module.sources | 504 providers/implementations/ciphers/cipher_aes.c 505 providers/implementations/ciphers/cipher_aes.h 506 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha.c 507 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha.h 508 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha1_hw.c 509 providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c 510 providers/implementations/ciphers/cipher_aes_ccm.c 511 providers/implementations/ciphers/cipher_aes_ccm.h 512 providers/implementations/ciphers/cipher_aes_ccm_hw.c 513 providers/implementations/ciphers/cipher_aes_ccm_hw_aesni.inc [all …]
|
H A D | fips-sources.checksums | 504 4db1826ecce8b60cb641bcd7a61430ec8cef73d2fe3cbc06aa33526afe1c954a providers/implementations/ciphers… 505 6ba7d817081cf0d87ba7bfb38cd9d70e41505480bb8bc796ef896f68d4514ea6 providers/implementations/ciphers… 506 aef500281e7cd5a25a806a9bd45ec00a5b73984673202527dac5896fbcc9fa9c providers/implementations/ciphers… 507 7668e5c1cac474ad7b0f28aa78ca885edf44815fe4a606a6cd328b3c02fac25a providers/implementations/ciphers… 508 26e0f28523b416ba4067e471061f5a11fd76f5dc8bfe57ce37a137cf5667630b providers/implementations/ciphers… 509 6d2ab2e059ef38fad342d4c65eebd533c08a2092bb174ff3566c6604e175c5a4 providers/implementations/ciphers… 510 f37c3cf9e2e6fcfcbed941f3670b790fe09990349db72eb065bef51705d46e96 providers/implementations/ciphers… 511 00f36bf48e522dbb5ec71df0ec13e387955fa3672e6ff90e8a412ae95c4a642f providers/implementations/ciphers… 512 6337b570e0dc4e98af07aa9704254d3ab958cf605584e250fbd76cd1d2a25ac7 providers/implementations/ciphers… 513 302b3819ff9fdfed750185421616b248b0e1233d75b45a065490fe4762b42f55 providers/implementations/ciphers… [all …]
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-ciphers.pod.in | 6 openssl-ciphers - SSL cipher display and cipher list command 10 B<openssl> B<ciphers> 47 Only list supported ciphers: those consistent with the security level, and 51 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp> 56 On a server the list of supported ciphers might also exclude other ciphers 59 If this option is not used then all ciphers that match the cipherlist will be 82 In combination with the B<-s> option, list the ciphers which could be used if 123 cipher suites of a certain type. For example B<SHA1> represents all ciphers 135 If B<!> is used then the ciphers are permanently deleted from the list. 136 The ciphers deleted can never reappear in the list even if they are [all …]
|
H A D | openssl-enc.pod.in | 14 [B<-ciphers>] 49 using various block and stream ciphers using keys based on passwords 67 List all supported ciphers. 69 =item B<-ciphers> 71 Alias of -list to display all supported ciphers. 221 engine-provided ciphers, because this form is processed before the 223 Use the L<openssl-list(1)> command to get a list of supported ciphers. 229 ciphers which are supported by the OpenSSL core or another engine specified 232 When the enc command lists supported ciphers, ciphers provided by engines, 250 Some of the ciphers do not have large keys and others have security [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | cipherlist_test.c | 150 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist() 159 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist() 163 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist() 169 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist() 179 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist()
|
H A D | dtls_mtu_test.c | 147 STACK_OF(SSL_CIPHER) *ciphers; in run_mtu_tests() 165 ciphers = SSL_CTX_get_ciphers(ctx); in run_mtu_tests() 166 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in run_mtu_tests() 167 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in run_mtu_tests()
|
H A D | sslcorrupttest.c | 189 STACK_OF(SSL_CIPHER) *ciphers; in test_ssl_corrupt() 206 || !TEST_ptr(ciphers = SSL_CTX_get_ciphers(cctx)) in test_ssl_corrupt() 207 || !TEST_int_eq(sk_SSL_CIPHER_num(ciphers), 1) in test_ssl_corrupt() 208 || !TEST_ptr(currcipher = sk_SSL_CIPHER_value(ciphers, 0))) in test_ssl_corrupt()
|
/freebsd/sys/net80211/ |
H A D | ieee80211_crypto.c | 56 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable 144 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none; in ieee80211_crypto_attach() 268 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { in ieee80211_crypto_register() 273 ciphers[cip->ic_cipher] = cip; in ieee80211_crypto_register() 287 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { in ieee80211_crypto_unregister() 294 ciphers[cip->ic_cipher] = NULL; in ieee80211_crypto_unregister() 300 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL; in ieee80211_crypto_available() 359 cip = ciphers[cipher]; in ieee80211_crypto_newkey() 376 cip = ciphers[cipher]; in ieee80211_crypto_newkey()
|
/freebsd/crypto/openssh/regress/unittests/kex/ |
H A D | test_proposal.c | 91 char *prop[PROPOSAL_MAX], *kexalgs, *ciphers, *macs, *hkalgs; in kex_proposal_populate_tests() local 98 ciphers = cipher_alg_list(',', 0); in kex_proposal_populate_tests() 111 ciphers, macs, hkalgs, comp); in kex_proposal_populate_tests() 121 free(ciphers); in kex_proposal_populate_tests()
|
/freebsd/crypto/openssl/util/perl/TLSProxy/ |
H A D | Proxy.pm | 103 ciphers => "AES128-SHA", 171 $self->{ciphers} = "AES128-SHA"; 234 if ($self->ciphers ne "") { 235 $execcmd .= " -cipher ".$self->ciphers; 624 sub ciphers subroutine 628 $self->{ciphers} = shift; 630 return $self->{ciphers};
|
/freebsd/sys/dev/qat/qat_api/common/ctrl/ |
H A D | sal_crypto.c | 1535 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_NULL); in cpaCySymQueryCapabilities() 1536 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_ECB); in cpaCySymQueryCapabilities() 1537 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_CBC); in cpaCySymQueryCapabilities() 1538 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_CTR); in cpaCySymQueryCapabilities() 1539 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_CCM); in cpaCySymQueryCapabilities() 1540 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_GCM); in cpaCySymQueryCapabilities() 1541 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_AES_XTS); in cpaCySymQueryCapabilities() 1543 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, CPA_CY_SYM_CIPHER_ARC4); in cpaCySymQueryCapabilities() 1544 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities() 1546 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities() [all …]
|
/freebsd/crypto/openssl/apps/ |
H A D | ciphers.c | 103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local 179 ciphers = argv[0]; in ciphers_main() 212 if (ciphers != NULL) { in ciphers_main() 213 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in ciphers_main()
|
/freebsd/contrib/wpa/src/common/ |
H A D | wpa_common.c | 3109 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument 3113 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites() 3117 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites() 3121 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites() 3125 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites() 3129 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites() 3133 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites() 3142 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument 3146 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites() 3150 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites() [all …]
|